IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223.
| Software | From | Fixed in |
|---|---|---|
| ibm / tivoli_monitoring | 6.3.0 | 6.3.0.x |
| ibm / tivoli_monitoring | 6.2.3.4 | 6.2.3.4.x |
| ibm / tivoli_monitoring | 6.3.0.7 | 6.3.0.7.x |
| ibm / tivoli_monitoring | 6.2.2.3 | 6.2.2.3.x |
| ibm / tivoli_monitoring | 6.2.2.6 | 6.2.2.6.x |
| ibm / tivoli_monitoring | 6.3.0.6 | 6.3.0.6.x |
| ibm / tivoli_monitoring | 6.2.3 | 6.2.3.x |
| ibm / tivoli_monitoring | 6.3.0.4 | 6.3.0.4.x |
| ibm / tivoli_monitoring | 6.2.2.4 | 6.2.2.4.x |
| ibm / tivoli_monitoring | 6.3.0.3 | 6.3.0.3.x |
| ibm / tivoli_monitoring | 6.3.0.5 | 6.3.0.5.x |
| ibm / tivoli_monitoring | 6.2.3.2 | 6.2.3.2.x |
| ibm / tivoli_monitoring | 6.2.3.5 | 6.2.3.5.x |
| ibm / tivoli_monitoring | 6.2.3.3 | 6.2.3.3.x |
| ibm / tivoli_monitoring | 6.2.2.2 | 6.2.2.2.x |
| ibm / tivoli_monitoring | 6.2.2.9 | 6.2.2.9.x |
| ibm / tivoli_monitoring | 6.3.0.1 | 6.3.0.1.x |
| ibm / tivoli_monitoring | 6.2.2.7 | 6.2.2.7.x |
| ibm / tivoli_monitoring | 6.2.2 | 6.2.2.x |
| ibm / tivoli_monitoring | 6.2.2.8 | 6.2.2.8.x |
| ibm / tivoli_monitoring | 6.3.0.2 | 6.3.0.2.x |
| ibm / tivoli_monitoring | 6.2.2.5 | 6.2.2.5.x |
| ibm / tivoli_monitoring | 6.2.3.1 | 6.2.3.1.x |