Filtered by vendor Infoblox Subscriptions
Total 26 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2002-2213 2 Infoblox, Isc 2 Dns One, Bind 2025-04-03 N/A
The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
CVE-2022-32972 1 Infoblox 1 Bloxone Endpoint 2025-03-18 7.8 High
Infoblox BloxOne Endpoint for Windows through 2.2.7 allows DLL injection that can result in local privilege escalation.
CVE-2023-37249 1 Infoblox 1 Nios 2024-11-21 8.8 High
Infoblox NIOS through 8.5.1 has a faulty component that accepts malicious input without sanitization, resulting in shell access.
CVE-2020-15303 1 Infoblox 1 Nios 2024-11-21 6.5 Medium
Infoblox NIOS before 8.5.2 allows entity expansion during an XML upload operation, a related issue to CVE-2003-1564.
CVE-2018-6643 1 Infoblox 1 Netmri 2024-11-21 N/A
Infoblox NetMRI 7.1.1 has Reflected Cross-Site Scripting via the /api/docs/index.php query parameter.
CVE-2018-10239 1 Infoblox 1 Nios 2024-11-21 N/A
A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the "support access" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the "support access" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. "Support access" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.