Vulnerability Database

With exploit

horde / horde_application_framework

Title Severity Exploit Date Affected Version
CVE-2015-7984 Medium Nov 19, 2015 >= 5.0.0 < 5.2.8
CVE-2014-1691 High Apr 1, 2014 == 5.0.1
== 5.0.4
<= 5.1.0
== 5.0.2
== 5.0.3
== 5.0.0
CVE-2010-3077 Low Nov 9, 2010 == 3.0.11
== 2.0-rc3
== 3.2.3
== 2.0
== 3.0-rc3
== 3.3.4-rc1
== 3.2
== 3.1.4-rc1
== 2.2.5
== 3.1
== 3.0-rc1
== 3.0.4
== 3.0.6-rc1
== 3.1.9
== 3.1-rc2
== 3.0
== 3.1.8
== 3.1.2
== 2.2.9
== 2.2.3
== 2.0-rc1
== 3.2-alpha
== 1.3.3
== 3.0.5
== 1.3.1
== 3.0.10
== 3.0.1
== 3.0-rc2
== 3.3.7
== 3.0.4-rc1
== 2.2.8
== 3.1-rc1
== 2.2.6
== 3.3
== 3.2-rc4
== 3.1.1
== 3.0.8
== 1.3.2
== 3.1.7
== 3.1.5
== 3.3.2
== 2.2.7
== 3.0.3
== 3.2-rc1
== 3.3-rc1
== 3.0.6
== 3.2-rc3
== 3.1-rc3
== 3.0.4-rc2
== 2.2.6-rc1
== 1.3.0
<= 3.3.8
== 3.0.5-rc2
== 2.2
== 3.3.4
== 3.0-alpha
== 1.3.5
== 2.2.1
== 3.3.5
== 3.2.1
== 2.2.2
== 3.2.5
== 3.3.1
== 3.2.2
== 3.0-beta
== 3.0.9
== 3.3.6
== 1.3.4
== 3.0.12
== 3.1.3
== 3.1.6
== 2.2.4
== 1.1.1
== 3.2.4
== 3.0.7
== 3.0.5-rc1
== 2.0-rc4
== 3.1.4
== 3.3.3
== 3.2-rc2
== 2.1
== 3.0.2
== 3.0.3-rc1
== 1.0.3
CVE-2010-3694 Medium Nov 9, 2010 == 3.0.11
== 2.0-rc3
== 3.2.3
== 2.0
== 3.0-rc3
== 3.3.4-rc1
== 3.2
== 3.1.4-rc1
== 2.2.5
== 3.1
== 3.0-rc1
== 3.0.4
== 3.0.6-rc1
== 3.1.9
== 3.1-rc2
== 3.0
== 3.1.8
== 3.1.2
== 2.2.9
== 2.2.3
== 2.0-rc1
== 3.2-alpha
== 1.3.3
== 3.0.5
== 1.3.1
== 3.0.10
== 3.0.1
== 3.0-rc2
== 3.3.7
== 3.0.4-rc1
== 2.2.8
== 3.1-rc1
== 2.2.6
== 3.3
== 3.2-rc4
== 3.1.1
== 3.0.8
== 1.3.2
== 3.1.7
== 3.1.5
== 3.3.2
== 2.2.7
== 3.0.3
== 3.2-rc1
== 3.3-rc1
== 3.0.6
== 3.2-rc3
== 3.1-rc3
== 3.0.4-rc2
== 2.2.6-rc1
== 1.3.0
<= 3.3.8
== 3.0.5-rc2
== 2.2
== 3.3.4
== 3.0-alpha
== 1.3.5
== 2.2.1
== 3.3.5
== 3.2.1
== 2.2.2
== 3.2.5
== 3.3.1
== 3.2.2
== 3.0-beta
== 3.0.9
== 3.3.6
== 1.3.4
== 3.0.12
== 3.1.3
== 3.1.6
== 2.2.4
== 1.1.1
== 3.2.4
== 3.0.7
== 3.0.5-rc1
== 2.0-rc4
== 3.1.4
== 3.3.3
== 3.2-rc2
== 2.1
== 3.0.2
== 3.0.3-rc1
== 1.0.3
CVE-2009-3237 Low Sep 17, 2009 == 3.2.3
== 3.2
== 3.3
== 3.3.2
== 3.3.4
== 3.2.1
== 3.3.1
== 3.2.2
== 3.2.4
== 3.3.3
CVE-2007-1473 Low Mar 16, 2007 == 1.2.3
== 2.0
== 1.2.4
== 3.0.0
== 2.2.5
== 3.0.4
== 3.1.0
== 3.1.2
== 2.2.9
== 2.2.3
== 1.2.1
== 1.3.3
== 3.0.5
== 3.0.10
== 3.0.1
== 1.2.6
== 2.2.8
== 2.2.6
== 1.2.0
== 1.2.7
== 3.1.1
== 3.0.8
== 2.2.7
== 3.0.3
== 3.0.6
== 2.2
== 2.2.1
== 3.0.9
== 1.3.4
== 3.1.3
== 2.2.4
== 3.0.7
== 1.2.2
== 1.2.8
== 1.2.5
== 2.1
== 3.0.2
CVE-2007-1474 Medium Mar 16, 2007 == 3.0.0
== 3.0.4
== 3.1.3
CVE-2006-3549 Medium Jul 13, 2006 == 3.0.0
== 3.0.4
== 3.1.0
== 3.0.5
== 3.0.10
== 3.0.1
== 3.1.1
== 3.0.8
== 3.0.3
== 3.0.6
== 3.0.9
== 3.0.7
== 3.0.2
CVE-2005-4190 Low Dec 13, 2005 == 1.2.3
== 1.0.3_4
== 1.0.2_1
== 2.0
== 1.2.4
== 1.0.3_3
== 2.2.5
== 3.0.4
== 1.0.10
== 2.2.9
== 2.2.3
== 1.2.1
== 1.0.9
== 1.3.3
== 3.0.5
== 3.0.1
== 1.2.6
== 2.2.8
== 2.2.6
== 1.2.0
== 1.0.0
== 1.2.7
== 2.2.7
== 3.0.3
== 3.0.6
== 1.0.4
== 2.2
== 1.0.2
== 2.2.1
== 1.0.8
== 1.3.4
== 2.2.4
== 1.0.11
== 3.0.7
== 1.0.3_2
== 1.2.2
== 1.2.8
== 1.2.5
== 2.1
== 3.0.2
== 1.0.6
== 1.0.3
== 1.0.5