{"uuid": "1111b1a0-ade9-4f61-8315-4e0fd2091f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56412", "type": "seen", "source": "https://t.me/cvedetector/14237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56412 - PhpSpreadsheet Cross-Site Scripting (XSS) Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56412 \nPublished : Jan. 3, 2025, 6:15 p.m. | 38\u00a0minutes ago \nDescription : PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to bypass of the cross-site scripting sanitizer using the javascript protocol and special characters. An attacker can use special characters, so that the library processes the javascript protocol with special characters and generates an HTML link. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T20:21:58.000000Z"}