IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223.
[
{
"product": "Tivoli Monitoring V6",
"vendor": "IBM Corporation",
"versions": [
{
"status": "affected",
"version": "6.2.0"
},
{
"status": "affected",
"version": "6.2.1"
},
{
"status": "affected",
"version": "6.2.2"
},
{
"status": "affected",
"version": "6.2.3"
},
{
"status": "affected",
"version": "6.3.0"
},
{
"status": "affected",
"version": "6.2.3.1"
},
{
"status": "affected",
"version": "6.2.3.2"
},
{
"status": "affected",
"version": "6.2.3.3"
},
{
"status": "affected",
"version": "6.2.3.4"
},
{
"status": "affected",
"version": "6.2.3.5"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.3.0.1"
},
{
"status": "affected",
"version": "6.3.0.2"
},
{
"status": "affected",
"version": "6.3.0.3"
},
{
"status": "affected",
"version": "6.3.0.4"
},
{
"status": "affected",
"version": "6.3.1"
},
{
"status": "affected",
"version": "6.3.0.5"
},
{
"status": "affected",
"version": "6.3.0.6"
},
{
"status": "affected",
"version": "6.2.2.2"
},
{
"status": "affected",
"version": "6.2.2.3"
},
{
"status": "affected",
"version": "6.2.2.4"
},
{
"status": "affected",
"version": "6.2.2.5"
},
{
"status": "affected",
"version": "6.2.2.6"
},
{
"status": "affected",
"version": "6.2.2.7"
},
{
"status": "affected",
"version": "6.2.2.8"
},
{
"status": "affected",
"version": "6.2.2.9"
},
{
"status": "affected",
"version": "6.3.0.7"
}
]
}
]