CVE-2008-0980

Spyce - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31267
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31268
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31266
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31269
exploitdb WRITEUP VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31265

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3699
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488336/100/0/threaded
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27898

Scores

EPSS 0.0033
EPSS Percentile 56.0%

Details

CWE
CWE-79
Status published
Products (1)
spyce/spyce 2.1.3
Published Feb 25, 2008
Tracked Since Feb 18, 2026