Unrated severityNVD Advisory· Published Nov 9, 2010· Updated Apr 29, 2026
CVE-2010-3077
CVE-2010-3077
Description
Cross-site scripting (XSS) vulnerability in util/icon_browser.php in the Horde Application Framework before 3.3.9 allows remote attackers to inject arbitrary web script or HTML via the subdir parameter.
Affected products
84cpe:2.3:a:horde:horde_application_framework:1.3.5:*:*:*:*:*:*:*+ 83 more
- cpe:2.3:a:horde:horde_application_framework:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:*:*:*:*:*:*:*:*range: <=3.3.8
- cpe:2.3:a:horde:horde_application_framework:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:alpha:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:rc3:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2:rc4:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:beta:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.5:rc2:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:3.1.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.horde.org/archives/announce/2010/000557.htmlnvdPatchVendor Advisory
- seclists.org/fulldisclosure/2010/Sep/82nvdExploitPatch
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050408.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050423.htmlnvd
- secunia.com/advisories/42140nvd
- bugzilla.redhat.com/show_bug.cginvd
News mentions
0No linked articles in our index yet.