{"vulnerability": "CVE-2024-4217", "sightings": [{"uuid": "2eb6595b-4da4-49d6-8af8-a83580c7c041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42170", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808295419160600", "content": "", "creation_timestamp": "2025-01-11T06:26:14.950353Z"}, {"uuid": "16e462f5-24d4-4c0e-905d-a59ef7db34f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808390690684579", "content": "", "creation_timestamp": "2025-01-11T06:50:28.098331Z"}, {"uuid": "26d8f662-27d4-4f70-9109-42ab895fe406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42175", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808714830628911", "content": "", "creation_timestamp": "2025-01-11T08:12:53.689608Z"}, {"uuid": "212a8e93-ee2f-4150-b75d-4b36bd707abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42173", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808416673551189", "content": "", "creation_timestamp": "2025-01-11T06:57:04.229083Z"}, {"uuid": "dd7b1875-3451-4ff7-b7eb-d88f985bbc90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42174", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808473013988329", "content": "", "creation_timestamp": "2025-01-11T07:11:27.624589Z"}, {"uuid": "2c4285eb-d76e-4d7f-b2cc-11c3ae82c9c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42170", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5wty2y32m", "content": "", "creation_timestamp": "2025-01-11T07:15:25.555479Z"}, {"uuid": "a0021b04-72eb-45fb-8daa-e26444fad3a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42174", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5x5myof2f", "content": "", "creation_timestamp": "2025-01-11T07:15:35.603589Z"}, {"uuid": "04ba38bf-8f1e-43b2-a855-9ba8ff598500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42175", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhbdnynx22k", "content": "", "creation_timestamp": "2025-01-11T08:16:16.747378Z"}, {"uuid": "71e72c35-998a-497c-8273-0ac4fff90d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42171", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5wwwime22", "content": "", "creation_timestamp": "2025-01-11T07:15:28.575921Z"}, {"uuid": "4640e982-c0c7-4b62-8a1e-e90066d4afc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5wyzjsb2i", "content": "", "creation_timestamp": "2025-01-11T07:15:30.798369Z"}, {"uuid": "25016ccb-20cf-4329-b86d-e530a2b6d123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42173", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5x3bwdy25", "content": "", "creation_timestamp": "2025-01-11T07:15:33.094651Z"}, {"uuid": "9088401b-5b82-4341-977a-10c092a8e1f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7ssrtbq2r", "content": "", "creation_timestamp": "2025-01-11T07:48:57.546077Z"}, {"uuid": "d6d08db5-6ddc-45ae-b939-dd70c80fd0b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42174", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7stccxn2h", "content": "", "creation_timestamp": "2025-01-11T07:48:58.747931Z"}, {"uuid": "45355b1a-ea7c-42a3-a2b0-85555608f3e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42171", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7stj7ey2g", "content": "", "creation_timestamp": "2025-01-11T07:48:59.814950Z"}, {"uuid": "28059a69-80db-4167-982f-e3d802257cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42170", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7st5vyq2r", "content": "", "creation_timestamp": "2025-01-11T07:48:58.202821Z"}, {"uuid": "c911ad7f-98e9-46b5-8bc2-aef9508413d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42173", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7stfqiy2k", "content": "", "creation_timestamp": "2025-01-11T07:48:59.281661Z"}, {"uuid": "64d695b1-a81d-4a2e-99ff-51b9adcd1ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42179", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113817583089944086", "content": "", "creation_timestamp": "2025-01-12T21:48:12.535137Z"}, {"uuid": "14cdddfa-4c7a-46a8-a79d-2c5252608d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42179", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lflap34pnp2n", "content": "", "creation_timestamp": "2025-01-12T22:15:25.163966Z"}, {"uuid": "310b5a96-7658-48fd-9de0-e36be43d909e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42172\n\ud83d\udd39 Description: HCL MyXalytics is affected by broken authentication.  It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control.  This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any application with access control, including databases, network infrastructure, and web applications.\n\ud83d\udccf Published: 2025-01-11T06:44:28.808Z\n\ud83d\udccf Modified: 2025-01-11T06:44:28.808Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T07:04:39.000000Z"}, {"uuid": "5764aa5d-2abb-4f34-b737-56a7c292f293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42177", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln274ossjh2d", "content": "", "creation_timestamp": "2025-04-17T22:53:32.899241Z"}, {"uuid": "d03668d6-db22-44dc-9dc4-13937ab61e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42178", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln274p5f422l", "content": "", "creation_timestamp": "2025-04-17T22:53:34.533054Z"}, {"uuid": "22389e68-61b8-4e58-9873-47cbe5cd3dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42179", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lflcrpbjyg2g", "content": "", "creation_timestamp": "2025-01-12T22:52:40.628606Z"}, {"uuid": "6a1eb4dc-5e4c-463f-a587-a01a18324225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnbjazb2s", "content": "", "creation_timestamp": "2025-03-19T18:43:43.544728Z"}, {"uuid": "bfd50c98-4db3-4853-a52e-3924f64a8df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42173", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1272", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42173\n\ud83d\udd39 Description: HCL MyXalytics is affected by an improper password policy implementation vulnerability.  Weak passwords and lack of account lockout policies allow attackers to guess or brute-force passwords if the username is known.\n\ud83d\udccf Published: 2025-01-11T06:54:33.550Z\n\ud83d\udccf Modified: 2025-01-11T06:54:33.550Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T07:04:32.000000Z"}, {"uuid": "dd4909fd-2df5-407c-bb8f-9e0395d7b8bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42179", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42179\n\ud83d\udd39 Description: HCL MyXalytics is affected by sensitive information disclosure vulnerability.  The HTTP response header exposes the Microsoft-HTTP API\u22152.0 as the server's name &amp; version.\n\ud83d\udccf Published: 2025-01-12T21:46:39.992Z\n\ud83d\udccf Modified: 2025-01-12T21:46:39.992Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-12T22:05:14.000000Z"}, {"uuid": "89875a76-d01f-4137-8805-46b0c6722cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42170", "type": "seen", "source": "https://t.me/cvedetector/15041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42170 - HCL MyXalytics Session Fixation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42170 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a session fixation vulnerability.  Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:04.000000Z"}, {"uuid": "0d276ab4-6439-40e6-8375-e8e4050b608f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42174", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1291", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42174\n\ud83d\udd39 Description: HCL MyXalytics is affected by username enumeration vulnerability.  This allows a malicious user to perform enumeration of application users, and therefore\u00a0compile a list of valid usernames.\n\ud83d\udccf Published: 2025-01-11T07:04:24.964Z\n\ud83d\udccf Modified: 2025-01-11T07:04:24.964Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T08:04:29.000000Z"}, {"uuid": "cfa490cb-c5d2-4b3e-b8cf-2111acdcd793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42175", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1290", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42175\n\ud83d\udd39 Description: HCL MyXalytics is affected by a weak input validation vulnerability.  The application accepts special characters and there is no length validation. This can lead to security vulnerabilities like SQL injection, XSS, and buffer overflow.\n\ud83d\udccf Published: 2025-01-11T07:20:57.617Z\n\ud83d\udccf Modified: 2025-01-11T07:20:57.617Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T08:04:26.000000Z"}, {"uuid": "5ea26424-4728-47e7-b3b5-14861062a34c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42170", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1275", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42170\n\ud83d\udd39 Description: HCL MyXalytics is affected by a session fixation vulnerability.  Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session.\n\ud83d\udccf Published: 2025-01-11T06:17:20.606Z\n\ud83d\udccf Modified: 2025-01-11T06:17:20.606Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T07:04:47.000000Z"}, {"uuid": "c39d11eb-5de0-4add-805f-3907796cd05f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42171", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42171\n\ud83d\udd39 Description: HCL MyXalytics is affected by a session fixation vulnerability.  Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session.\n\ud83d\udccf Published: 2025-01-11T06:31:24.165Z\n\ud83d\udccf Modified: 2025-01-11T06:31:24.165Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T07:04:44.000000Z"}, {"uuid": "4fcb2681-2a7d-41c2-8c40-0d2db97a4034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42178", "type": "seen", "source": "https://t.me/cvedetector/23299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42178 - HCL MyXalytics URL Access Restriction Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42178 \nPublished : April 17, 2025, 10:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a failure to restrict URL access vulnerability. Unauthenticated users might gain unauthorized access to potentially confidential information, creating a risk of misuse, manipulation, or unauthorized distribution. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T03:12:14.000000Z"}, {"uuid": "11ca7d41-6ac9-485b-a890-6ac805a2919c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42177", "type": "seen", "source": "https://t.me/cvedetector/23289", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42177 - HCL MyXalytics SSL/TLS Cipher Weakness (Decryption and Injection)\", \n  \"Content\": \"CVE ID : CVE-2024-42177 \nPublished : April 17, 2025, 8:15 p.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : HCL MyXalytics is affected by SSL\u2215TLS Protocol affected with BREACH &amp; LUCKY13 vulnerabilities. Attackers can exploit the weakness in the ciphers to intercept and decrypt encrypted data, steal sensitive information, or inject malicious code into the system. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T00:41:47.000000Z"}, {"uuid": "d0facb02-e45f-4d5a-b931-31c0c16b3429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42176", "type": "seen", "source": "https://t.me/cvedetector/20657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42176 - HCL MyXalytics Concurrent Login Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42176 \nPublished : March 19, 2025, 3:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : HCL MyXalytics is affected by concurrent login vulnerability. A concurrent login vulnerability occurs when simultaneous active sessions are allowed for a single credential allowing an attacker to potentially obtain access to a user's account or sensitive information. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:36.000000Z"}, {"uuid": "1311d7c8-6cbc-46d0-a869-9f68b1afc8b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42176", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8059", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42176\n\ud83d\udd25 CVSS Score: 2.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: HCL MyXalytics is affected by concurrent login vulnerability. A concurrent login vulnerability occurs when simultaneous active sessions are allowed for a single credential allowing an attacker to potentially obtain access to a user's account or sensitive information.\n\ud83d\udccf Published: 2025-03-19T14:24:21.759Z\n\ud83d\udccf Modified: 2025-03-19T15:05:13.705Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0119919", "creation_timestamp": "2025-03-19T15:17:42.000000Z"}, {"uuid": "df9334d9-88b5-49a4-8042-5c468762d701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42178", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12361", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42178\n\ud83d\udd25 CVSS Score: 2.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: HCL MyXalytics is affected by a failure to restrict URL access vulnerability. Unauthenticated users might gain unauthorized access to potentially confidential information, creating a risk of misuse, manipulation, or unauthorized distribution.\n\ud83d\udccf Published: 2025-04-17T21:24:34.185Z\n\ud83d\udccf Modified: 2025-04-17T21:24:34.799Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0120502", "creation_timestamp": "2025-04-17T21:58:16.000000Z"}, {"uuid": "7f697c87-5fbd-4c73-a886-3a1fdaa7b964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42171", "type": "seen", "source": "https://t.me/cvedetector/15039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42171 - HCL MyXalytics Session Fixation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42171 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a session fixation vulnerability.  Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:03.000000Z"}, {"uuid": "6d0d4cd1-79f1-4597-8d60-3658f7704901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://t.me/cvedetector/15040", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42172 - HCL MyXalytics Broken Authentication Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42172 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by broken authentication.  It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control.  This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any application with access control, including databases, network infrastructure, and web applications. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:03.000000Z"}, {"uuid": "bef017ee-6480-40a1-b9fe-bd8c6f7d770b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42175", "type": "seen", "source": "https://t.me/cvedetector/15043", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42175 - HCL MyXalytics Weak Input Validation Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42175 \nPublished : Jan. 11, 2025, 8:15 a.m. | 33\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a weak input validation vulnerability.  The application accepts special characters and there is no length validation. This can lead to security vulnerabilities like SQL injection, XSS, and buffer overflow. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:54:08.000000Z"}, {"uuid": "f8048f73-0e64-481f-8316-2eeb71c16725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42174", "type": "seen", "source": "https://t.me/cvedetector/15037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42174 - HCL MyXalytics Username Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42174 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by username enumeration vulnerability.  This allows a malicious user to perform enumeration of application users, and therefore\u00a0compile a list of valid usernames. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:01.000000Z"}, {"uuid": "c58d6c18-3476-4586-9996-cc0b28e982c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42173", "type": "seen", "source": "https://t.me/cvedetector/15038", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42173 - HCL MyXalytics Unsecured Authentication Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-42173 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by an improper password policy implementation vulnerability.  Weak passwords and lack of account lockout policies allow attackers to guess or brute-force passwords if the username is known. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:02.000000Z"}, {"uuid": "5b66425f-949c-40e3-8e0a-f7d329e29002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42179", "type": "seen", "source": "https://t.me/cvedetector/15107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42179 - HCL MyXalytics Server Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-42179 \nPublished : Jan. 12, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : HCL MyXalytics is affected by sensitive information disclosure vulnerability.  The HTTP response header exposes the Microsoft-HTTP API\u22152.0 as the server's name &amp; version. \nSeverity: 2.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T00:21:11.000000Z"}]}