This document discusses cache poisoning attacks. It begins with an overview and introduction to web cache poisoning and related attacks like HTTP response splitting. It then provides an example of how HTTP response splitting works and can be used to conduct a cache poisoning attack by injecting malicious content. The document outlines practical considerations for both attackers in conducting such an attack and victims in preventing them, such as input validation and restricting special characters. It concludes with a bibliography of additional resources on these topics.