CVE-2008-0980

Spyce - XSS

Title source: rule

Description

Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31267
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31266
exploitdb WRITEUP VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31265
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31268
exploitdb WORKING POC VERIFIED
by Richard Brain · textwebappsphp
https://www.exploit-db.com/exploits/31269

Scores

EPSS 0.0037
EPSS Percentile 58.5%

Classification

CWE
CWE-79
Status draft

Affected Products (1)

spyce/spyce

Timeline

Published Feb 25, 2008
Tracked Since Feb 18, 2026