Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-2490
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2006 | 23:02
Updated At-03 Apr, 2025 | 01:03

Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

mobotix
mobotix
>>mobotix_ip_network_camera>>d10
cpe:2.3:a:mobotix:mobotix_ip_network_camera:d10:*:*:*:*:*:*:*
mobotix
mobotix
>>mobotix_ip_network_camera>>m1_1.9.4.7
cpe:2.3:a:mobotix:mobotix_ip_network_camera:m1_1.9.4.7:*:*:*:*:*:*:*
mobotix
mobotix
>>mobotix_ip_network_camera>>m10_2.0.5.2
cpe:2.3:a:mobotix:mobotix_ip_network_camera:m10_2.0.5.2:*:*:*:*:*:*:*
mobotix
mobotix
>>mobotix_ip_network_camera>>m22
cpe:2.3:a:mobotix:mobotix_ip_network_camera:m22:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Provided Solution Statement: According the vendor, MOBOTIX "has resolved this problem as of 2006-06-27. MOBOTIX AG provides new software versions that include a security patch that prevents cross site scripting flaws. Customers are encouraged to upgrade to at least software version - V2.2.3.18 (for camera models M10/D10) and - V3.0.3.31 (for camera model M22) or higher (if available). The software is available for download from our website http://www.mobotix.com/services/software_downloads"

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/20151cve@mitre.org
Exploit
Patch
Vendor Advisory
http://securityreason.com/securityalert/929cve@mitre.org
N/A
http://securitytracker.com/id?1016128cve@mitre.org
Exploit
http://www.attrition.org/pipermail/vim/2006-August/000980.htmlcve@mitre.org
N/A
http://www.eazel.es/media/advisory001.htmlcve@mitre.org
Exploit
http://www.osvdb.org/25621cve@mitre.org
Exploit
http://www.osvdb.org/25622cve@mitre.org
Exploit
http://www.osvdb.org/25623cve@mitre.org
Exploit
http://www.securityfocus.com/archive/1/434289/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/444018/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/18022cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/1857cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26538cve@mitre.org
N/A
http://secunia.com/advisories/20151af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://securityreason.com/securityalert/929af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1016128af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.attrition.org/pipermail/vim/2006-August/000980.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.eazel.es/media/advisory001.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/25621af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/25622af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/25623af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/434289/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/444018/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/18022af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/1857af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26538af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found