Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
horde horde 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-4242
Multiple cross-site scripting (XSS) vulnerabilities in Horde Turba H3 2.0.4 and previous versions allow remote malicious users to inject arbitrary web script or HTML via (1) the address book and (2) contact data.
Horde Turba H3 2.0.1
Horde Turba H3 2.0.2
Horde Turba H3 2.0
Horde Turba H3 2.0.3
Horde Turba H3
NA
CVE-2007-1474
Argument injection vulnerability in the cleanup cron script in Horde Project Horde and IMP before Horde Application Framework 3.1.4 allows local users to delete arbitrary files and possibly gain privileges via multiple space-delimited pathnames.
Horde Horde Application Framework 3.0.4
Horde Horde Application Framework 3.1.3
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2.1
Horde Imp 3.2.2
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.3
Horde Imp 3.2.4
Horde Horde Application Framework 3.0.0
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1.2
Horde Imp 3.2
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
Horde Imp 3.0
Horde Imp 3.1
1 EDB exploit
NA
CVE-2005-4080
Horde IMP 4.0.4 and previous versions does not sanitize strings containing UTF16 null characters, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via UTF16 encoded attachments and strings that will be executed when viewed using Internet Explorer,...
Horde Imp 2.0
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 3.2.2
Horde Imp 3.2.3
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 3.1
Horde Imp 3.1.2
Horde Imp 4.0
Horde Imp 4.0.1
Horde Imp 2.2.5
Horde Imp 2.2.6
Horde Imp 3.2
Horde Imp 3.2.1
Horde Imp 4.0.2
Horde Imp 4.0.3
Horde Imp 4.0.4
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.3
1 EDB exploit
NA
CVE-2000-0911
IMP 2.2 and previous versions allows malicious users to read and delete arbitrary files by modifying the attachment_name hidden form variable, which causes IMP to send the file to the attacker as an attachment.