{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:16:47.281","vulnerabilities":[{"cve":{"id":"CVE-2005-2042","sourceIdentifier":"cve@mitre.org","published":"2005-06-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in ajax-spell before 1.8 allows remote attackers to inject arbitrary web script or HTML via onmouseover or other events in HTML tags."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.1:*:*:*:*:*:*:*","matchCriteriaId":"8133E0A5-D412-4BD2-A33A-DEF5D37D22BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.2:*:*:*:*:*:*:*","matchCriteriaId":"0F1E2A80-4D7E-4ADB-A593-8298C8AC06BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.3:*:*:*:*:*:*:*","matchCriteriaId":"95572287-F0E8-45A6-B1EB-E930AEFF054C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.4:*:*:*:*:*:*:*","matchCriteriaId":"A7DC4A79-2550-412E-8123-CC84972EC113"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.5:*:*:*:*:*:*:*","matchCriteriaId":"C23A1C66-94D1-48CE-B21A-EF1EE44C238F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.6:*:*:*:*:*:*:*","matchCriteriaId":"53AC678F-68AB-4EB3-A303-7E41456D2047"},{"vulnerable":true,"criteria":"cpe:2.3:a:ajax-spell:ajax-spell:1.7:*:*:*:*:*:*:*","matchCriteriaId":"94A4921C-1B12-4A52-BA7C-D54AE14B4070"}]}]}],"references":[{"url":"http://secunia.com/advisories/15737","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sourceforge.net/project/shownotes.php?release_id=335556","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.broken-notebook.com/spell_checker/index.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/13986","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/15737","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://sourceforge.net/project/shownotes.php?release_id=335556","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.broken-notebook.com/spell_checker/index.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/13986","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}