Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cache poisoning vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-34163
IBM CICS TX 11.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an malicious user to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. ...
Ibm Cics Tx 11.1
605
VMScore
CVE-2008-3217
PowerDNS Recursor prior to 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associate...
Powerdns Recursor 3.1.2
Powerdns Recursor 3.1.3
Powerdns Recursor 3.0.1
Powerdns Recursor 3.1.1
Powerdns Recursor 3.0
Powerdns Recursor 3.1.4
Powerdns Recursor
445
VMScore
CVE-2005-0175
Squid 2.5 up to 2.5.STABLE7 allows remote malicious users to poison the cache via an HTTP response splitting attack.
Squid Squid 2.5.6
Squid Squid 2.5.stable7
Squid Squid 2.5 .stable1
Squid Squid 2.5.stable3
Squid Squid 2.5.stable4
Squid Squid 2.5 .stable6
Squid Squid 2.5 Stable3
Squid Squid 2.5.stable5
Squid Squid 2.5.stable6
Squid Squid 2.5 Stable4
Squid Squid 2.5 Stable9
Squid Squid 2.5.stable1
Squid Squid 2.5.stable2
Squid Squid 2.5 .stable3
Squid Squid 2.5 .stable4
Squid Squid 2.5 .stable5
NA
CVE-2022-22399
IBM Aspera Faspex 5.0.0 and 5.0.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an malicious user to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or se...
312
VMScore
CVE-2019-4461
IBM Cloud Orchestrator 2.4 up to and including 2.4.0.5 and 2.5 up to and including 2.5.0.9 is vulnerable to HTTP Response Splitting caused by improper caching of content. This would allow the malicious user to perform further attacks, such as Web Cache poisoning, cross-site scrip...
Ibm Cloud Orchestrator
NA
CVE-2022-34362
IBM Sterling Secure Proxy 6.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an malicious user to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or ses...
Ibm Sterling Secure Proxy 6.0.3
481
VMScore
CVE-2005-3899
The automatic update feature in Google Talk allows remote malicious users to cause a denial of service (CPU and memory consumption) by poisoning a target's DNS cache and causing a large update file to be sent, which consumes large amounts of CPU and memory during the signatu...
Google Talk
490
VMScore
CVE-2022-34306
IBM CICS TX Standard and Advanced 11.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an malicious user to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning ...
Ibm Cics Tx 11.1
405
VMScore
CVE-2013-1509
Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 7.6.2, 11.1.1.6.0, and 11.1.1.6.1 allows remote authenticated users to affect integrity via unknown vectors related to WebCenter Sites.
Oracle Fusion Middleware 11.1.1.6.1
Oracle Fusion Middleware 7.6.2
Oracle Fusion Middleware 11.1.1.6.0
1 EDB exploit
NA
CVE-2023-45190
IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an malicious user to conduct various attacks against the vulnerable system, including cross-site scripting, ...
Ibm Engineering Lifecycle Optimization 7.0.2
Ibm Engineering Lifecycle Optimization 7.0.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »