{"vulnerability": "CVE-2024-4218", "sightings": [{"uuid": "f50bee98-7c70-47c6-906b-543d3101523f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42188", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482052698777533", "content": "", "creation_timestamp": "2024-11-14T15:38:24.985693Z"}, {"uuid": "f0aedec4-5d72-413f-b96c-c79092951369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113817607063198957", "content": "", "creation_timestamp": "2025-01-12T21:54:19.024802Z"}, {"uuid": "ae09e119-7fcb-4886-9574-88640a9c5cde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42181", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113817664516251519", "content": "", "creation_timestamp": "2025-01-12T22:08:55.025848Z"}, {"uuid": "ed2a349c-cf2b-4657-9be9-2411b4ffab19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lflap62u6w2b", "content": "", "creation_timestamp": "2025-01-12T22:15:28.033260Z"}, {"uuid": "e9b0739b-17a3-4aba-a973-1474583ac317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42181", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lflapabypp2n", "content": "", "creation_timestamp": "2025-01-12T22:15:30.121870Z"}, {"uuid": "2618e1b1-3415-46ab-8e05-a2e49130c9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42181", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lflcrq22342q", "content": "", "creation_timestamp": "2025-01-12T22:52:41.862491Z"}, {"uuid": "45a2ab6a-8d96-4735-bb70-f3a446e602f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lflcrq65jc2q", "content": "", "creation_timestamp": "2025-01-12T22:52:42.447565Z"}, {"uuid": "dc7e5bb3-4e91-46a0-99fc-efe7b0e979a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42182", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgepgyidzm27", "content": "", "creation_timestamp": "2025-01-23T01:15:53.192561Z"}, {"uuid": "cd52df01-9e33-4b25-924b-74d255c37b93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42182", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgerej64hs2w", "content": "", "creation_timestamp": "2025-01-23T01:50:17.545884Z"}, {"uuid": "0b18d57d-ad28-48f8-8956-7816c5145043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42183", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgesuax46y2j", "content": "", "creation_timestamp": "2025-01-23T02:16:59.753871Z"}, {"uuid": "d4464bc0-4e2e-452b-97c5-cf475205f23e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42183", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgeuyugd4w2e", "content": "", "creation_timestamp": "2025-01-23T02:55:21.570851Z"}, {"uuid": "aae3fc59-f09b-4646-a179-a88035e7cfaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42184", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgew5m2nvu2p", "content": "", "creation_timestamp": "2025-01-23T03:15:54.477767Z"}, {"uuid": "ed316821-f17d-4e2c-be30-9aaca9d8f575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42185", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgew5oc5c42h", "content": "", "creation_timestamp": "2025-01-23T03:15:56.609141Z"}, {"uuid": "9cd78c06-5c51-443a-ab33-304d53cf5c36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42186", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgew5quukq2c", "content": "", "creation_timestamp": "2025-01-23T03:15:59.550713Z"}, {"uuid": "3f5f5160-6636-4122-8571-32a4661551c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42187", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgew5tdu6k2w", "content": "", "creation_timestamp": "2025-01-23T03:16:01.874964Z"}, {"uuid": "9774ea9c-ee2e-4595-96b9-354a3182bd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42185", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgexahpxu525", "content": "", "creation_timestamp": "2025-01-23T03:35:24.631342Z"}, {"uuid": "ce6efb19-19e1-4643-9ead-3c4d2fa8b154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42184", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgexahtphg2h", "content": "", "creation_timestamp": "2025-01-23T03:35:25.175099Z"}, {"uuid": "6c8cafe4-a35c-4de2-93de-f2e4d5bae0d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42186", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgexai3rcs2q", "content": "", "creation_timestamp": "2025-01-23T03:35:26.398629Z"}, {"uuid": "a3c7128c-e454-44fb-adb5-18d394c0dad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42187", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgexai7aaz2e", "content": "", "creation_timestamp": "2025-01-23T03:35:26.991789Z"}, {"uuid": "b00acc86-4dad-401a-8694-554fe88bde55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmuqalqmvv2j", "content": "", "creation_timestamp": "2025-04-15T18:44:04.441471Z"}, {"uuid": "8293f0d5-2091-4977-9580-17b5f2c3f5b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1340", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42180\n\ud83d\udd39 Description: HCL MyXalytics is affected by a malicious file upload vulnerability.  The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.\n\ud83d\udccf Published: 2025-01-12T21:53:03.369Z\n\ud83d\udccf Modified: 2025-01-12T21:53:03.369Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-12T22:05:12.000000Z"}, {"uuid": "c485073e-5494-4850-8b39-3fa06ee5a826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42182", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2736", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42182\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability.  It may allow the application to download files from an internally hosted server on localhost.\n\ud83d\udccf Published: 2025-01-23T01:05:52.350Z\n\ud83d\udccf Modified: 2025-01-23T14:54:26.538Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T15:02:56.000000Z"}, {"uuid": "989150a4-5bf7-4757-ab74-5ac0d063ff65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2710", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42184\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by insecure support for file URI scheme.  It could allow a malicious operator to attempt to download files using the file:// URI scheme.\n\ud83d\udccf Published: 2025-01-23T01:59:00.971Z\n\ud83d\udccf Modified: 2025-01-23T01:59:00.971Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T03:02:53.000000Z"}, {"uuid": "f871b33e-55b3-4b37-9222-fceedb28b6bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42185", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2709", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42185\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by an insecure package which is susceptible to XML injection attacks.  This allows an attacker to exploit this vulnerability by injecting malicious XML content, which can lead to various issues including denial of service and unauthorized access.\n\ud83d\udccf Published: 2025-01-23T02:10:02.525Z\n\ud83d\udccf Modified: 2025-01-23T02:21:15.016Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T03:02:49.000000Z"}, {"uuid": "e9ac5f36-68de-470b-b4d0-69577f96bc52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2685", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42183\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability.  It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls.\n\ud83d\udccf Published: 2025-01-23T01:42:47.496Z\n\ud83d\udccf Modified: 2025-01-23T01:42:47.496Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T02:02:32.000000Z"}, {"uuid": "914421ac-b839-4bf3-91ab-3a8508d9157f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42186", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2706", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42186\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by an insecure protocol support.  The application can allow improper handling of SSL certificates validation.\n\ud83d\udccf Published: 2025-01-23T02:47:40.896Z\n\ud83d\udccf Modified: 2025-01-23T02:47:40.896Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T03:02:47.000000Z"}, {"uuid": "1fe2067b-c2ba-42ee-abbf-8245bed5f3c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42187", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2705", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42187\n\ud83d\udd39 Description: BigFix Patch Download Plug-ins are affected by path traversal vulnerability.  The application could allow operators to download files from a local repository which is vulnerable to path traversal attacks.\n\ud83d\udccf Published: 2025-01-23T02:53:07.305Z\n\ud83d\udccf Modified: 2025-01-23T02:53:07.305Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118565", "creation_timestamp": "2025-01-23T03:02:46.000000Z"}, {"uuid": "175c0b78-d4b2-4088-81c9-bc2cd5611241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42189", "type": "seen", "source": "https://t.me/cvedetector/22991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42189 - HCL BigFix Web Reports Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-42189 \nPublished : April 15, 2025, 6:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : HCL BigFix Web Reports might be subject to a Denial of Service (DoS) attack, due to a potentially weak validation of an API parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T21:37:52.000000Z"}, {"uuid": "0f31be9c-8276-4bee-a7a8-84887a5a0334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42185", "type": "seen", "source": "https://t.me/cvedetector/16159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42185 - IBM BigFix XML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42185 \nPublished : Jan. 23, 2025, 3:15 a.m. | 39\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by an insecure package which is susceptible to XML injection attacks.  This allows an attacker to exploit this vulnerability by injecting malicious XML content, which can lead to various issues including denial of service and unauthorized access. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T04:56:38.000000Z"}, {"uuid": "4e2f0803-e1fa-4648-82e5-d9a10be13a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42184", "type": "seen", "source": "https://t.me/cvedetector/16158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42184 - BigFix File URI Scheme Insecure Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42184 \nPublished : Jan. 23, 2025, 3:15 a.m. | 39\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by insecure support for file URI scheme.  It could allow a malicious operator to attempt to download files using the file:// URI scheme. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T04:56:34.000000Z"}, {"uuid": "deee16b2-3aa0-493a-9eaf-fa8341fd3271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42186", "type": "seen", "source": "https://t.me/cvedetector/16155", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42186 - BigFix SSL Certificate Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42186 \nPublished : Jan. 23, 2025, 3:15 a.m. | 39\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by an insecure protocol support.  The application can allow improper handling of SSL certificates validation. \nSeverity: 2.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T04:56:32.000000Z"}, {"uuid": "e50c4efc-4f81-49bc-82fe-f6f3f4422163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42187", "type": "seen", "source": "https://t.me/cvedetector/16154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42187 - BigFix Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42187 \nPublished : Jan. 23, 2025, 3:15 a.m. | 39\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by path traversal vulnerability.  The application could allow operators to download files from a local repository which is vulnerable to path traversal attacks. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T04:56:31.000000Z"}, {"uuid": "ec67fca7-b037-46d2-a376-bd4dcdc34431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42183", "type": "seen", "source": "https://t.me/cvedetector/16153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42183 - BigFix Patch Download Plug-ins File Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42183 \nPublished : Jan. 23, 2025, 2:15 a.m. | 50\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability.  It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T04:06:23.000000Z"}, {"uuid": "59b35f7c-a7dd-4cdb-a9b8-09bc2123de81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42188", "type": "seen", "source": "https://t.me/cvedetector/10968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42188 - HCL Connections Broken Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42188 \nPublished : Nov. 14, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : HCL Connections is vulnerable to a broken access control vulnerability that may allow an unauthorized user to update data in certain scenarios. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T18:20:01.000000Z"}, {"uuid": "c4a44516-0d3d-46ed-8330-4b128f70713a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42182", "type": "seen", "source": "https://t.me/cvedetector/16149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42182 - BigFix Patch Download Plug-ins SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-42182 \nPublished : Jan. 23, 2025, 1:15 a.m. | 38\u00a0minutes ago \nDescription : BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability.  It may allow the application to download files from an internally hosted server on localhost. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T03:16:15.000000Z"}, {"uuid": "ef5eb157-d6a6-4e6b-a069-91d975aeba85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://t.me/cvedetector/15106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42180 - HCL MyXalytics File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42180 \nPublished : Jan. 12, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a malicious file upload vulnerability.  The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files. \nSeverity: 1.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T00:21:10.000000Z"}, {"uuid": "e4fb10a6-8e2e-4a5f-89e3-dcacb77289b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42181", "type": "seen", "source": "https://t.me/cvedetector/15105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42181 - HCL MyXalytics Cleartext Transmission of Sensitive Information\", \n  \"Content\": \"CVE ID : CVE-2024-42181 \nPublished : Jan. 12, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability.  The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. \nSeverity: 1.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T00:21:10.000000Z"}]}