{"vulnerability": "CVE-2024-42168", "sightings": [{"uuid": "9a6dad02-797d-4b7c-98ee-14946705f362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfgqkujr7425", "content": "", "creation_timestamp": "2025-01-11T03:16:04.769743Z"}, {"uuid": "fa26fccf-cad2-4eae-ae5b-cb6ab8a4b7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113807676554369854", "content": "", "creation_timestamp": "2025-01-11T03:48:50.998985Z"}, {"uuid": "d4ec5317-793d-4ba2-9081-de5cab30dd53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgta3zdha2g", "content": "", "creation_timestamp": "2025-01-11T04:03:45.160426Z"}, {"uuid": "7ff7a179-1f23-4281-a916-73278190525e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgta4rpxx2k", "content": "", "creation_timestamp": "2025-01-11T04:03:49.092738Z"}, {"uuid": "14a18e76-e38c-47a8-af09-db2def2702ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113807478214183739", "content": "", "creation_timestamp": "2025-01-11T02:58:24.470349Z"}, {"uuid": "6831fbc9-8b45-4d79-b213-756dc322f75a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1258", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42168\n\ud83d\udd39 Description: HCL MyXalytics is affected by out-of-band resource load (HTTP) vulnerability.  An attacker can deploy a web server that returns malicious content, and then induce the application to retrieve and process that content.\n\ud83d\udccf Published: 2025-01-11T02:24:38.352Z\n\ud83d\udccf Modified: 2025-01-11T02:24:38.352Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T03:04:04.000000Z"}, {"uuid": "6c5ae4ac-0e67-42df-9ce6-b060fb09a462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42168", "type": "seen", "source": "https://t.me/cvedetector/15029", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42168 - HCL MyXalytics HTTP Request Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42168 \nPublished : Jan. 11, 2025, 3:15 a.m. | 28\u00a0minutes ago \nDescription : HCL MyXalytics is affected by out-of-band resource load (HTTP) vulnerability.  An attacker can deploy a web server that returns malicious content, and then induce the application to retrieve and process that content. \nSeverity: 8.9 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T04:53:22.000000Z"}]}