Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
horde horde 3.0 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2006-2195
Cross-site scripting (XSS) vulnerability in horde 3 (horde3) prior to 3.1.1 allows remote malicious users to inject arbitrary web script or HTML via (1) templates/problem/problem.inc and (2) test.php.
Horde Horde 3.0
Horde Horde 3.0.6
Horde Horde 3.0.7
Horde Horde 3.0.1
Horde Horde 3.0.2
Horde Horde 3.0.8
Horde Horde
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.3
Horde Horde 3.0.4
4.3
CVSSv2
CVE-2006-3548
Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 up to and including 3.0.10 and 3.1.0 up to and including 3.1.1 allow remote malicious users to inject arbitrary web script or HTML via a (1) javascript URI or an external (2) http, (3) https,...
Horde Horde 3.0.2
Horde Horde 3.0.3
Horde Horde 3.0.9
Horde Horde 3.1
Horde Horde 3.0.4
Horde Horde 3.0.4 Rc1
Horde Horde 3.1.1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.6
Horde Horde 3.0
Horde Horde 3.0.1
Horde Horde 3.0.7
Horde Horde 3.0.8
4.3
CVSSv2
CVE-2005-0378
Multiple cross-site scripting (XSS) vulnerabilities in Horde 3.0 allow remote malicious users to inject arbitrary web script or HTML via the (1) group parameter to prefs.php or (2) url parameter to index.php.
Horde Horde 3.0
4.3
CVSSv2
CVE-2006-4255
Cross-site scripting (XSS) vulnerability in horde/imp/search.php in Horde IMP H3 prior to 4.1.3 allows remote malicious users to include arbitrary web script or HTML via multiple unspecified vectors related to folder names, as injected into the vfolder_label form field in the IMP...
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 3.0.6
Horde Imp 2.2
Horde Imp 2.2.1
Horde Imp 2.2.8
Horde Imp 2.3
Horde Imp 3.2.4
Horde Imp 3.2.5
Horde Horde 3.0.1
Horde Horde 3.0.2
Horde Horde 3.0.9
Horde Horde 3.1
Horde Horde 3.0
Horde Horde 3.0.7
Horde Horde 3.0.8
Horde Imp 2.2.2
Horde Imp 2.2.3
Horde Imp 3.0
Horde Imp 3.1
Horde Horde 3.0.3
Horde Horde 3.0.4
5.8
CVSSv2
CVE-2005-3759
Multiple cross-site scripting (XSS) vulnerabilities in Horde prior to 3.0.7 allow remote malicious users to inject arbitrary web script or HTML via the (1) gzip/tar and (2) css MIME viewers, which do not filter or escape dangerous HTML when extracting and displaying attachments.
Horde Horde 1.2.4
Horde Horde 1.2.5
Horde Horde 2.2.1
Horde Horde 2.2.3
Horde Horde 2.2.9
Horde Horde 3.0
Horde Horde 3.0.6
Horde Horde 3.0.7
Horde Horde 1.2.2
Horde Horde 1.2.3
Horde Horde 2.1
Horde Horde 2.1.3
Horde Horde 2.2
Horde Horde 2.2.7
Horde Horde 2.2.8
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 1.2.6
Horde Horde 1.2.7
Horde Horde 2.2.4
Horde Horde 2.2.4 Rc1
Horde Horde 3.0.1
5
CVSSv2
CVE-2006-1260
Horde Application Framework 3.0.9 allows remote malicious users to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
Horde Horde 1.2.2
Horde Horde 1.2.3
Horde Horde 2.1
Horde Horde 2.1.3
Horde Horde 2.2.6
Horde Horde 2.2.7
Horde Horde 2.2.8
Horde Horde 3.0.4 Rc1
Horde Horde 3.0.4 Rc2
Horde Horde 1.2.4
Horde Horde 1.2.5
Horde Horde 2.2
Horde Horde 2.2.1
Horde Horde 2.2.9
Horde Horde 3.0
Horde Horde 3.0.6
Horde Horde 3.0.7
Horde Horde 1.2
Horde Horde 1.2.1
Horde Horde 1.2.8
Horde Horde 2.0
Horde Horde 2.2.4 Rc1
1 EDB exploit
4.3
CVSSv2
CVE-2004-1443
Cross-site scripting (XSS) vulnerability in the inline MIME viewer in Horde-IMP (Internet Messaging Program) 3.2.4 and previous versions, when used with Internet Explorer, allows remote malicious users to inject arbitrary web script or HTML via an e-mail message.
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.2
Horde Imp 3.2.3
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1
Horde Imp 3.1.2
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2
Horde Imp 3.2.1
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
Horde Imp 3.0
Horde Imp 3.2.4
6.8
CVSSv2
CVE-2004-0584
Unknown vulnerability in Horde IMP 3.2.3 and previous versions, before a "security fix," does not properly validate input, which allows remote malicious users to execute arbitrary script as other users via script or HTML in an e-mail message, possibly triggering a cross...
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.2
Horde Imp 3.2.3
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
Horde Imp 3.0
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1
Horde Imp 3.1.2
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2
Horde Imp 3.2.1
4.3
CVSSv2
CVE-2005-4080
Horde IMP 4.0.4 and previous versions does not sanitize strings containing UTF16 null characters, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via UTF16 encoded attachments and strings that will be executed when viewed using Internet Explorer,...
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.2
Horde Imp 3.2.3
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1
Horde Imp 3.1.2
Horde Imp 4.0
Horde Imp 4.0.1
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2
Horde Imp 3.2.1
Horde Imp 4.0.2
Horde Imp 4.0.3
Horde Imp 4.0.4
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
1 EDB exploit
6.8
CVSSv2
CVE-2007-1474
Argument injection vulnerability in the cleanup cron script in Horde Project Horde and IMP before Horde Application Framework 3.1.4 allows local users to delete arbitrary files and possibly gain privileges via multiple space-delimited pathnames.
Horde Horde Application Framework 3.0.4
Horde Horde Application Framework 3.1.3
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2.1
Horde Imp 3.2.2
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.3
Horde Imp 3.2.4
Horde Horde Application Framework 3.0.0
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1.2
Horde Imp 3.2
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
Horde Imp 3.0
Horde Imp 3.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »