Yab Quarx is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible.
Quarx through 2.4.3 are vulnerable.
Information
Yab Quarx 2.4.2
Yab Quarx 2.4.1
Yab Quarx 2.4
Yab Quarx 2.0
Yab Quarx 1.4.18
Yab Quarx 1.2
Yab Quarx 0.1
Yab Quarx 2.4.5
Exploit
Attackers can exploit these issues using browser or readily available tools.
References: