{"vulnerability": "CVE-2024-42172", "sightings": [{"uuid": "16e462f5-24d4-4c0e-905d-a59ef7db34f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808390690684579", "content": "", "creation_timestamp": "2025-01-11T06:50:28.098331Z"}, {"uuid": "4640e982-c0c7-4b62-8a1e-e90066d4afc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfh5wyzjsb2i", "content": "", "creation_timestamp": "2025-01-11T07:15:30.798369Z"}, {"uuid": "9088401b-5b82-4341-977a-10c092a8e1f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfh7ssrtbq2r", "content": "", "creation_timestamp": "2025-01-11T07:48:57.546077Z"}, {"uuid": "310b5a96-7658-48fd-9de0-e36be43d909e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42172\n\ud83d\udd39 Description: HCL MyXalytics is affected by broken authentication.  It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control.  This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any application with access control, including databases, network infrastructure, and web applications.\n\ud83d\udccf Published: 2025-01-11T06:44:28.808Z\n\ud83d\udccf Modified: 2025-01-11T06:44:28.808Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-11T07:04:39.000000Z"}, {"uuid": "6d0d4cd1-79f1-4597-8d60-3658f7704901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42172", "type": "seen", "source": "https://t.me/cvedetector/15040", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42172 - HCL MyXalytics Broken Authentication Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42172 \nPublished : Jan. 11, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : HCL MyXalytics is affected by broken authentication.  It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control.  This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any application with access control, including databases, network infrastructure, and web applications. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:04:03.000000Z"}]}