Description
Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31267
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31268
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31266
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31269
exploitdb
WRITEUP
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31265
References (4)
Core 4
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3699
Exploit x_refsource_misc
http://www.procheckup.com/Vulnerability_PR08-01.php
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488336/100/0/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27898
Scores
EPSS
0.0033
EPSS Percentile
56.0%
Details
CWE
CWE-79
Status
published
Products (1)
spyce/spyce
2.1.3
Published
Feb 25, 2008
Tracked Since
Feb 18, 2026