Description
Cross-site scripting (XSS) vulnerability in recommend.php in Chipmunk Directory script allows remote attackers to inject arbitrary web script or HTML via the entryID parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alireza Hassani · textwebappsphp
https://www.exploit-db.com/exploits/26381
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15149/
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112982490104274&w=2
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17283/
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/96
URL Repurposed x_refsource_misc
http://irannetjob.com/content/view/148/28/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20169
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22823
Scores
EPSS
0.0070
EPSS Percentile
72.1%
Details
Status
published
Products (1)
chipmunk_scripts/chipmunk_directory
Published
Nov 06, 2005
Tracked Since
Feb 18, 2026