Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 13, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
255321 6.9 警告 acpid - acpid の umask におけるサービス運用妨害 (DoS) の脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-4235 2010-01-21 11:44 2009-12-7 Show GitHub Exploit DB Packet Storm
255322 6.9 警告 サイバートラスト株式会社
レッドハット
acpid
- acpid のレッドハットパッチにおける権限を取得される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-4033 2010-01-21 11:43 2009-12-7 Show GitHub Exploit DB Packet Storm
255323 10 危険 アドビシステムズ - Adobe Illustrator における任意のコードを実行される脆弱性 CWE-119
バッファエラー
CVE-2009-3952 2010-01-21 11:43 2010-01-7 Show GitHub Exploit DB Packet Storm
255324 9.3 危険 アドビシステムズ - Adobe Illustrator における Encapsulated PostScript ファイルの処理に関する任意のコードを実行される脆弱性 CWE-119
バッファエラー
CVE-2009-4195 2010-01-21 11:43 2009-12-4 Show GitHub Exploit DB Packet Storm
255325 4.4 警告 サイバートラスト株式会社
Linux
レッドハット
- Linux Kernel の exit_notify 関数における任意のシグナルをプロセスに送信可能な脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-1337 2010-01-21 11:23 2009-04-22 Show GitHub Exploit DB Packet Storm
255326 4.9 警告 サイバートラスト株式会社
Linux
レッドハット
- Linux Kernel における sendmsg 関数の呼び出しに関するサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2008-5300 2010-01-21 11:22 2008-12-1 Show GitHub Exploit DB Packet Storm
255327 6.8 警告 シスコシステムズ - 複数の SSL VPN (Web VPN) 製品においてウェブブラウザのセキュリティが迂回される問題 CWE-264
認可・権限・アクセス制御
CVE-2009-2631 2010-01-20 14:15 2009-12-1 Show GitHub Exploit DB Packet Storm
255328 4.4 警告 DAG
レッドハット
- dstat における Python module の検索パスに関する権限昇格の脆弱性 CWE-Other
その他
CVE-2009-3894 2010-01-20 14:15 2009-11-29 Show GitHub Exploit DB Packet Storm
255329 6.4 警告 OSIsoft - PI Server の OSIsoft PI System におけるデータベースの情報を変更される脆弱性 CWE-310
暗号の問題
CVE-2009-0209 2010-01-20 14:14 2009-10-1 Show GitHub Exploit DB Packet Storm
255330 9.3 危険 サン・マイクロシステムズ
freedesktop.org
レッドハット
サイバートラスト株式会社
Glyph & Cog, LLC
- Xpdf および Poppler の PSOutputDev::doImageL1Sep 関数における整数オーバーフローの脆弱性 CWE-189
数値処理の問題
CVE-2009-3606 2010-01-20 11:57 2009-10-15 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 14, 2026, 4 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
212541 9.8 CRITICAL
Network
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … CWE-326
Inadequate Encryption Strength
CVE-2020-10275 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212542 7.1 HIGH
Network
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… CWE-330
 Use of Insufficiently Random Values
CVE-2020-10274 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212543 7.5 HIGH
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… CWE-312
 Cleartext Storage of Sensitive Information
CVE-2020-10273 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212544 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… CWE-306
Missing Authentication for Critical Function
CVE-2020-10272 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212545 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… CWE-668
 Exposure of Resource to Wrong Sphere
CVE-2020-10271 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212546 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… CWE-798
 Use of Hard-coded Credentials
CVE-2020-10270 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212547 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wirel… CWE-798
 Use of Hard-coded Credentials
CVE-2020-10269 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
212548 7.5 HIGH
Network
redhat wildfly A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering ca… CWE-502
 Deserialization of Untrusted Data
CVE-2020-10740 2024-11-21 13:55 2020-06-23 Show GitHub Exploit DB Packet Storm
212549 8.0 HIGH
Adjacent
linuxfoundation ceph An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthor… NVD-CWE-Other
CVE-2020-10736 2024-11-21 13:55 2020-06-23 Show GitHub Exploit DB Packet Storm
212550 5.5 MEDIUM
Local
linuxfoundation jaeger Sensitive information written to a log file vulnerability was found in jaegertracing/jaeger before version 1.18.1 when the Kafka data store is used. This flaw allows an attacker with access to the co… CWE-532
 Inclusion of Sensitive Information in Log Files
CVE-2020-10750 2024-11-21 13:55 2020-06-20 Show GitHub Exploit DB Packet Storm