{"vulnerability": "CVE-2024-56364", "sightings": [{"uuid": "1e9a2ff1-72d6-463e-aef3-54d676fb645e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56364", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113702950354491013", "content": "", "creation_timestamp": "2024-12-23T15:55:36.181166Z"}, {"uuid": "c88f1c87-a8ff-41ca-aaa4-c8dcb9e8ea8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56364", "type": "seen", "source": "https://t.me/cvedetector/13539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56364 - SimpleXLSX Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56364 \nPublished : Dec. 23, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : SimpleXLSX is software for parsing and retrieving data from Excel XLSx files. Starting in 1.0.12 and ending in 1.1.13, when calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code. This vulnerability is fixed in 1.1.13. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-23T18:20:02.000000Z"}]}