Vulnerabilities > Infoblox

DATE CVE VULNERABILITY TITLE RISK
2012-09-20 CVE-2011-5178 Cross-Site Scripting vulnerability in Infoblox Netmri
Multiple cross-site scripting (XSS) vulnerabilities in netmri/config/userAdmin/login.tdf in Infoblox NetMRI 6.0.2.42, 6.1.2, 6.2.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) eulaAccepted or (2) mode parameter.
network
infoblox CWE-79
4.3
2004-12-06 CVE-2004-0606 Unspecified vulnerability in Infoblox DNS ONE Appliance 2.4.0.8/2.4.0.8A
Cross-site scripting (XSS) vulnerability in Infoblox DNS One running firmware 2.4.0-8 and earlier allows remote attackers to execute arbitrary scripts as other users via the (1) CLIENTID or (2) HOSTNAME option of a DHCP request.
network
infoblox
6.8
2004-08-06 CVE-2004-0461 Buffer Overflow vulnerability in ISC DHCPD VSPRINTF
The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overflow vulnerabilities that enable a denial of service (server crash) and possibly execute arbitrary code.
network
low complexity
infoblox isc suse mandrakesoft redhat
critical
10.0
2004-08-06 CVE-2004-0460 Buffer Overflow vulnerability in ISC DHCPD Hostname Options Logging
Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DISCOVER, (2) OFFER, (3) REQUEST, (4) ACK, or (5) NAK messages, which can generate a long string when writing to a log file.
network
low complexity
infoblox isc suse mandrakesoft redhat
critical
10.0
2002-12-31 CVE-2002-2213 Remote Security vulnerability in BIND
The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
network
low complexity
infoblox isc
5.0