Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
horde horde 3.1.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2008-3824
Cross-site scripting (XSS) vulnerability in (1) Text_Filter/Filter/xss.php in Horde 3.1.x prior to 3.1.9 and 3.2.x prior to 3.2.2 and (2) externalinput.php in Popoon r22196 and previous versions allows remote malicious users to inject arbitrary web script or HTML by using / (slas...
Horde Horde 3.2
Horde Horde 3.1.6
Horde Horde 3.1.8
Popoon Popoon
Horde Horde 3.2.1
Horde Horde 3.1.2
Horde Horde 3.1.1
Horde Horde 3.1.7
Horde Horde 3.1.5
Horde Horde 3.1.4
Horde Horde 3.1.3
1 EDB exploit
4.3
CVSSv2
CVE-2006-3548
Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 up to and including 3.0.10 and 3.1.0 up to and including 3.1.1 allow remote malicious users to inject arbitrary web script or HTML via a (1) javascript URI or an external (2) http, (3) https,...
Horde Horde 3.0.2
Horde Horde 3.0.3
Horde Horde 3.0.9
Horde Horde 3.1
Horde Horde 3.0.4
Horde Horde 3.0.4 Rc1
Horde Horde 3.1.1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.6
Horde Horde 3.0
Horde Horde 3.0.1
Horde Horde 3.0.7
Horde Horde 3.0.8
5
CVSSv2
CVE-2006-3549
services/go.php in Horde Application Framework 3.0.0 up to and including 3.0.10 and 3.1.0 up to and including 3.1.1 does not properly restrict its image proxy capability, which allows remote malicious users to perform "Web tunneling" attacks and use the server as a prox...
Horde Horde Application Framework 3.0.4
Horde Horde Application Framework 3.0.5
Horde Horde Application Framework 3.0.0
Horde Horde Application Framework 3.0.6
Horde Horde Application Framework 3.0.7
Horde Horde Application Framework 3.0.1
Horde Horde Application Framework 3.0.10
Horde Horde Application Framework 3.0.8
Horde Horde Application Framework 3.0.9
Horde Horde Application Framework 3.0.2
Horde Horde Application Framework 3.0.3
Horde Horde Application Framework 3.1.0
Horde Horde Application Framework 3.1.1
6.8
CVSSv2
CVE-2006-2195
Cross-site scripting (XSS) vulnerability in horde 3 (horde3) prior to 3.1.1 allows remote malicious users to inject arbitrary web script or HTML via (1) templates/problem/problem.inc and (2) test.php.
Horde Horde 3.0
Horde Horde 3.0.6
Horde Horde 3.0.7
Horde Horde 3.0.1
Horde Horde 3.0.2
Horde Horde 3.0.8
Horde Horde
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.3
Horde Horde 3.0.4
4.3
CVSSv2
CVE-2006-4255
Cross-site scripting (XSS) vulnerability in horde/imp/search.php in Horde IMP H3 prior to 4.1.3 allows remote malicious users to include arbitrary web script or HTML via multiple unspecified vectors related to folder names, as injected into the vfolder_label form field in the IMP...
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.6
Horde Imp 2.2
Horde Imp 2.2.1
Horde Imp 2.2.8
Horde Imp 2.3
Horde Imp 3.2.4
Horde Imp 3.2.5
Horde Horde 3.0.1
Horde Horde 3.0.2
Horde Horde 3.0.9
Horde Horde 3.1
Horde Horde 3.0
Horde Horde 3.0.7
Horde Horde 3.0.8
Horde Imp 2.2.2
Horde Imp 2.2.3
Horde Imp 3.0
Horde Imp 3.1
Horde Horde 3.0.3
Horde Horde 3.0.4
4.3
CVSSv2
CVE-2006-4256
index.php in Horde Application Framework prior to 3.1.2 allows remote malicious users to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka "cross-site referencing." NOTE: some sources have referred to thi...
Horde Application Framework 3.0
Horde Application Framework 3.0.1
Horde Application Framework 3.0.7
Horde Application Framework 3.0.8
Horde Application Framework 3.0.4 Rc2
Horde Application Framework 3.0.6
Horde Application Framework 3.0.4
Horde Application Framework 3.0.4 Rc1
Horde Application Framework 3.1.1
Horde Application Framework 3.0.2
Horde Application Framework 3.0.3
Horde Application Framework 3.0.9
Horde Application Framework 3.1
5
CVSSv2
CVE-2006-1260
Horde Application Framework 3.0.9 allows remote malicious users to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
Horde Horde 1.2.2
Horde Horde 1.2.3
Horde Horde 2.1
Horde Horde 2.1.3
Horde Horde 2.2.6
Horde Horde 2.2.7
Horde Horde 2.2.8
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 1.2.4
Horde Horde 1.2.5
Horde Horde 2.2
Horde Horde 2.2.1
Horde Horde 2.2.9
Horde Horde 3.0
Horde Horde 3.0.6
Horde Horde 3.0.7
Horde Horde 1.2
Horde Horde 1.2.1
Horde Horde 1.2.8
Horde Horde 2.0
Horde Horde 2.2.4 Rc1
1 EDB exploit
4.3
CVSSv2
CVE-2007-1473
Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework prior to 3.1.4 RC1, when the login page contains a language selection box, allows remote malicious users to inject arbitrary web script or HTML via the new_lang parameter to login.php.
Horde Horde Application Framework 1.2.5
Horde Horde Application Framework 1.2.6
Horde Horde Application Framework 1.2.7
Horde Horde Application Framework 2.2.1
Horde Horde Application Framework 2.2.3
Horde Horde Application Framework 3.0.0
Horde Horde Application Framework 3.0.1
Horde Horde Application Framework 3.0.8
Horde Horde Application Framework 3.0.9
Horde Horde Application Framework 1.2.0
Horde Horde Application Framework 1.2.8
Horde Horde Application Framework 1.3.3
Horde Horde Application Framework 2.2.4
Horde Horde Application Framework 2.2.5
Horde Horde Application Framework 3.0.10
Horde Horde Application Framework 3.0.2
Horde Horde Application Framework 3.1.0
Horde Horde Application Framework 3.1.1
Horde Horde Application Framework 1.2.3
Horde Horde Application Framework 1.2.4
Horde Horde Application Framework 2.1
Horde Horde Application Framework 2.2
1 EDB exploit
6.8
CVSSv2
CVE-2010-3694
Cross-site request forgery (CSRF) vulnerability in the Horde Application Framework prior to 3.3.9 allows remote malicious users to hijack the authentication of unspecified victims for requests to a preference form.
Horde Horde Application Framework 1.0.3
Horde Horde Application Framework 1.1.1
Horde Horde Application Framework 2.0
Horde Horde Application Framework 2.1
Horde Horde Application Framework 2.2.7
Horde Horde Application Framework 2.2.8
Horde Horde Application Framework 3.0.3
Horde Horde Application Framework 3.0.9
Horde Horde Application Framework 3.1.3
Horde Horde Application Framework 3.1.4
Horde Horde Application Framework 3.2.1
Horde Horde Application Framework 3.2.3
Horde Horde Application Framework 3.3.5
Horde Horde Application Framework 3.3.6
Horde Horde Application Framework 3.1.8
Horde Horde Application Framework 3.0.5
Horde Horde Application Framework 3.2
Horde Horde Application Framework 3.0.8
Horde Horde Application Framework 1.3.3
Horde Horde Application Framework 1.3.4
Horde Horde Application Framework 2.2
Horde Horde Application Framework 2.2.1
4.3
CVSSv2
CVE-2010-3077
Cross-site scripting (XSS) vulnerability in util/icon_browser.php in the Horde Application Framework prior to 3.3.9 allows remote malicious users to inject arbitrary web script or HTML via the subdir parameter.
Horde Horde Application Framework 1.0.3
Horde Horde Application Framework 1.1.1
Horde Horde Application Framework 2.0
Horde Horde Application Framework 2.1
Horde Horde Application Framework 2.2.6
Horde Horde Application Framework 2.2.7
Horde Horde Application Framework 3.0.3
Horde Horde Application Framework 3.0.9
Horde Horde Application Framework 3.1.3
Horde Horde Application Framework 3.1.4
Horde Horde Application Framework 3.2
Horde Horde Application Framework 3.2.1
Horde Horde Application Framework 3.3.5
Horde Horde Application Framework 3.3.6
Horde Horde Application Framework 3.1.8
Horde Horde Application Framework 3.0.5
Horde Horde Application Framework 3.0.8
Horde Horde Application Framework 1.3.2
Horde Horde Application Framework 1.3.5
Horde Horde Application Framework 2.2.4
Horde Horde Application Framework 2.2.5
Horde Horde Application Framework 3.0.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »