Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

[+] Horde webmail - Open Redirect Vulnerability 
[+] Date: 31/03/2014
[+] Risk: Low
[+] Remote: Yes
[+] Author: Felipe Andrian Peixoto
[+] Vendor Homepage:
[+] Contact: [email protected]
[+] Tested on: Windows 7 and Linux
[+] Vulnerable File: go.php
[+] Dork: inurl:horde/util/go.php?
[+] Version: 5.1 probably other versions too
[+] Exploit : http://host/horde/util/go.php?url=[ Open Redirect Vul ]
[+] PoC:

Note : An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. 
This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
Reference :

Copyright ©2021 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.