CVE-2026-24476
- EPSS 0.03%
- Veröffentlicht 26.01.2026 22:26:59
- Zuletzt bearbeitet 17.02.2026 20:45:33
Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. V...
CVE-2023-49469
- EPSS 0.16%
- Veröffentlicht 28.12.2023 06:15:44
- Zuletzt bearbeitet 21.11.2024 08:33:27
Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function.
CVE-2013-7351
- EPSS 0.96%
- Veröffentlicht 02.01.2020 20:15:15
- Zuletzt bearbeitet 21.11.2024 02:00:48
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile fu...
CVE-2018-5249
- EPSS 0.31%
- Veröffentlicht 05.01.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:08:25
Cross-site scripting (XSS) vulnerability in Shaarli before 0.8.5 and 0.9.x before 0.9.3 allows remote attackers to inject arbitrary code via the login form's username field (aka the login parameter to the ban_canLogin function in index.php).
CVE-2017-15215
- EPSS 1.04%
- Veröffentlicht 11.10.2017 01:32:55
- Zuletzt bearbeitet 20.04.2025 01:37:25
Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change gl...