<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 05:59:48 +0000</lastBuildDate>
    <item>
      <title>ed6e9b2e-49f3-4351-ac9d-a45735a7af08</title>
      <link>https://db.gcve.eu/sighting/ed6e9b2e-49f3-4351-ac9d-a45735a7af08/export</link>
      <description>{"uuid": "ed6e9b2e-49f3-4351-ac9d-a45735a7af08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45060", "type": "seen", "source": "https://t.me/cvedetector/7280", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45060 - PHPSpreadsheet Formula Injection XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45060 \nPublished : Oct. 7, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. One of the sample scripts in PhpSpreadsheet is susceptible to a cross-site scripting (XSS) vulnerability due to improper handling of input where a number is expected leading to formula injection. The code in in `45_Quadratic_equation_solver.php` concatenates the user supplied parameters directly into spreadsheet formulas. This allows an attacker to take control over the formula and output unsanitized data into the page, resulting in JavaScript execution. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T00:19:43.000000Z"}</description>
      <content:encoded>{"uuid": "ed6e9b2e-49f3-4351-ac9d-a45735a7af08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45060", "type": "seen", "source": "https://t.me/cvedetector/7280", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45060 - PHPSpreadsheet Formula Injection XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45060 \nPublished : Oct. 7, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. One of the sample scripts in PhpSpreadsheet is susceptible to a cross-site scripting (XSS) vulnerability due to improper handling of input where a number is expected leading to formula injection. The code in in `45_Quadratic_equation_solver.php` concatenates the user supplied parameters directly into spreadsheet formulas. This allows an attacker to take control over the formula and output unsanitized data into the page, resulting in JavaScript execution. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T00:19:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ed6e9b2e-49f3-4351-ac9d-a45735a7af08/export</guid>
      <pubDate>Tue, 08 Oct 2024 00:19:43 +0000</pubDate>
    </item>
  </channel>
</rss>
