Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2017-04-12Horde Groupware Webmail 3 / 4 / 5 Code ExecutionPublished
2015-11-19Horde Groupware 5.2.10 Cross Site Request ForgeryPublished
2014-06-30Horde Framework Unserialize PHP Code Execution Standalone ExploitPublished
2014-06-05Horde Ldap Stricter parameter check in bind to detect empty passwordsPublished
2014-04-01Horde webmail - Open Redirect VulnerabilityPublished
2014-03-21Horde Framework Unserialize PHP Code ExecutionPublished
2014-01-29Horde < 5.1.1 Remote code executionPublished
2013-10-30Horde Groupware Web Mail Edition 5.1.2 CSRF VulnerabilityPublished
2012-02-22Horde 3.3.12 Backdoor Arbitrary PHP Code ExecutionPublished
2011-04-05XSS in Horde IMP <=4.3.7, fetchmailprefs.phpPublished
2011-02-14Horde Horde_Image::factory driver Argument Local File InclusionPublished
2010-11-16Horde Application Framework <=3.3.8 XSS VulnerabilityPublished
2010-10-06Horde IMPs 4.3.7 below cross site scripting vulnerabilityPublished
2009-12-29Horde Groupware 1.2.5 and application_framework 3.3.3 Multiple VulnsPublished
2008-09-19Horde, Popoon frameworks common inputsanitization errors XSSPublished
2008-09-11Horde - Cross-Site Scripting in filename MIME attachmentsPublished
2008-03-25Horde Webmail file inclusion proof of concept & patch.Published
2007-04-01Horde Webmail Multiple HTML Injection vulnerabilityPublished
2007-03-21Horde 3.1.4 RC1 fixes XSS issuePublished
2006-08-25Horde Framework and Horde IMP /horde/imp/search.php cross site scriptingPublished
2006-08-25Horde Framework and Horde IMP /index.php cross site referencingPublished
2006-04-08VihorDesing Script Remote Command Exucetion And Cross Scripting AttackPublished
2006-03-23CodeScan Advisory: Unauthenticated Arbitrary File Read in Horde v3.09 and priorPublished
2005-12-13Horde IMP Webmail Client XSS all versionsPublished




Copyright © 2017 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.