CVE-2005-1782

N/A Unknown
Published: May 26, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in BookReview beta 1.0 allow remote attackers to inject arbitrary web script or HTML via the node parameter to (1) add_review.htm, (2) suggest_review.htm, (3) suggest_category.htm, (4) add_booklist.htm, or (5) add_url.htm, the isbn parameter to (6) add_review.htm, (7) add_contents.htm, (8) add_classification.htm, the (9) chapters parameter to the add_contents page in index.php (aka add_contents.htm), (10) the user parameter to contact.htm, or (11) the submit[string] parameter to search.htm. NOTE: it is not clear whether BookReview is available to the public. If not, then it should not be included in CVE.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://securitytracker.com/id?1014058
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16871
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16872
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16873
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16874
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16875
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16876
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16877
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16878
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/16879
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/13783
Source: cve@mitre.org
Vendor Advisory
http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://securitytracker.com/id?1014058
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16871
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16872
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16873
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16874
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16875
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16876
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16877
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16878
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/16879
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/13783
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
83th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

w.m.r._simpson