CVE-2008-0980
Spyce - XSS
Title source: ruleDescription
Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31267
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31266
exploitdb
WRITEUP
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31265
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31268
exploitdb
WORKING POC
VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31269
Scores
EPSS
0.0037
EPSS Percentile
58.5%
Classification
CWE
CWE-79
Status
draft
Affected Products (1)
spyce/spyce
Timeline
Published
Feb 25, 2008
Tracked Since
Feb 18, 2026