IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tivoli_monitoring | Ibm | 6.2.2 (including) | 6.2.2 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.2 (including) | 6.2.2.2 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.3 (including) | 6.2.2.3 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.4 (including) | 6.2.2.4 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.5 (including) | 6.2.2.5 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.6 (including) | 6.2.2.6 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.7 (including) | 6.2.2.7 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.8 (including) | 6.2.2.8 (including) |
| Tivoli_monitoring | Ibm | 6.2.2.9 (including) | 6.2.2.9 (including) |
| Tivoli_monitoring | Ibm | 6.2.3 (including) | 6.2.3 (including) |
| Tivoli_monitoring | Ibm | 6.2.3.1 (including) | 6.2.3.1 (including) |
| Tivoli_monitoring | Ibm | 6.2.3.2 (including) | 6.2.3.2 (including) |
| Tivoli_monitoring | Ibm | 6.2.3.3 (including) | 6.2.3.3 (including) |
| Tivoli_monitoring | Ibm | 6.2.3.4 (including) | 6.2.3.4 (including) |
| Tivoli_monitoring | Ibm | 6.2.3.5 (including) | 6.2.3.5 (including) |
| Tivoli_monitoring | Ibm | 6.3.0 (including) | 6.3.0 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.1 (including) | 6.3.0.1 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.2 (including) | 6.3.0.2 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.3 (including) | 6.3.0.3 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.4 (including) | 6.3.0.4 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.5 (including) | 6.3.0.5 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.6 (including) | 6.3.0.6 (including) |
| Tivoli_monitoring | Ibm | 6.3.0.7 (including) | 6.3.0.7 (including) |