{"vulnerability": "CVE-2024-42180", "sightings": [{"uuid": "f0aedec4-5d72-413f-b96c-c79092951369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113817607063198957", "content": "", "creation_timestamp": "2025-01-12T21:54:19.024802Z"}, {"uuid": "ed2a349c-cf2b-4657-9be9-2411b4ffab19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lflap62u6w2b", "content": "", "creation_timestamp": "2025-01-12T22:15:28.033260Z"}, {"uuid": "45a2ab6a-8d96-4735-bb70-f3a446e602f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lflcrq65jc2q", "content": "", "creation_timestamp": "2025-01-12T22:52:42.447565Z"}, {"uuid": "ef5eb157-d6a6-4e6b-a069-91d975aeba85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://t.me/cvedetector/15106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42180 - HCL MyXalytics File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42180 \nPublished : Jan. 12, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : HCL MyXalytics is affected by a malicious file upload vulnerability.  The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files. \nSeverity: 1.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T00:21:10.000000Z"}, {"uuid": "8293f0d5-2091-4977-9580-17b5f2c3f5b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42180", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1340", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42180\n\ud83d\udd39 Description: HCL MyXalytics is affected by a malicious file upload vulnerability.  The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.\n\ud83d\udccf Published: 2025-01-12T21:53:03.369Z\n\ud83d\udccf Modified: 2025-01-12T21:53:03.369Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0118149", "creation_timestamp": "2025-01-12T22:05:12.000000Z"}]}