{"vulnerability": "CVE-2024-2179", "sightings": [{"uuid": "0cc081ea-b42d-4791-b652-d7f4c1cc2fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21799", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113477705693737048", "content": "", "creation_timestamp": "2024-11-13T21:12:54.987702Z"}, {"uuid": "1a486e3c-19e5-493d-a58a-22e49fd8a8f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21797", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpk6qja5d2c", "content": "", "creation_timestamp": "2025-01-14T15:15:53.192229Z"}, {"uuid": "6410a5d0-cda4-48ab-8356-82d9809fd846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21798", "type": "seen", "source": "Telegram/zIo9NdGCY2o7paISOy8x1Bsz-9ZB2P9gVKAJ9rsHl9XdXV9N", "content": "", "creation_timestamp": "2025-02-14T21:08:30.000000Z"}, {"uuid": "6bb2005d-7bd4-4c25-a494-108e8298574c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18497", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21794\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: In Rapid Software LLC's Rapid SCADA versions prior to\u00a0Version 5.8.4,\u00a0an attacker can redirect users to malicious pages through the login page.\n\n\ud83d\udccf Published: 2024-02-01T23:25:57.523Z\n\ud83d\udccf Modified: 2025-06-16T18:16:09.465Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03\n2. https://rapidscada.org/contact/", "creation_timestamp": "2025-06-16T18:38:48.000000Z"}, {"uuid": "83dd0619-6123-4706-97ef-ebd94343f58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21795", "type": "seen", "source": "https://t.me/arpsyndicate/3846", "content": "#ExploitObserverAlert\n\nCVE-2024-21795\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-21795. A heap-based buffer overflow vulnerability exists in the .egi parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .egi file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-02-21T15:29:13.000000Z"}, {"uuid": "c31a2737-df62-444e-8ed6-dd6d6872da1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21798", "type": "seen", "source": "https://t.me/ctinow/196032", "content": "https://ift.tt/zNiQ72X\nCVE-2024-21798", "creation_timestamp": "2024-02-29T00:27:00.000000Z"}, {"uuid": "7b8bff62-fc11-498f-b3fd-9629cd0ee930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21798", "type": "seen", "source": "https://t.me/ctinow/196025", "content": "https://ift.tt/zNiQ72X\nCVE-2024-21798", "creation_timestamp": "2024-02-29T00:26:53.000000Z"}, {"uuid": "1930dc47-38c1-4c3f-8dcc-e2a5a2edd931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2179", "type": "seen", "source": "https://t.me/ctinow/200761", "content": "https://ift.tt/OAx0nEv\nCVE-2024-2179", "creation_timestamp": "2024-03-05T22:26:26.000000Z"}, {"uuid": "c1ef3a25-acbe-41f7-a584-a9bc66dcf583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2179", "type": "seen", "source": "https://t.me/ctinow/200771", "content": "https://ift.tt/OAx0nEv\nCVE-2024-2179", "creation_timestamp": "2024-03-05T22:32:16.000000Z"}, {"uuid": "77ba69ae-f4a5-484c-8c6c-4ee529f1e0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21795", "type": "seen", "source": "https://t.me/ctinow/188757", "content": "https://ift.tt/LxrdXIM\nCVE-2024-21795", "creation_timestamp": "2024-02-20T17:25:44.000000Z"}, {"uuid": "2a1517cd-f6f1-4bf0-8fcc-8d97d379a6c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21796", "type": "seen", "source": "https://t.me/ctinow/186977", "content": "https://ift.tt/iOpges7\nCVE-2024-21796 | Ministry of Defense Electronic Deliverables Creation Support Tool (Construction Edition) XML File xml external entity reference", "creation_timestamp": "2024-02-17T17:16:14.000000Z"}, {"uuid": "ec474b21-8321-474f-b805-b5d784520581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/ctinow/177979", "content": "https://ift.tt/9KQdV71\nCVE-2024-21794 | Rapid SCADA up to 5.8.4 redirect (icsa-24-011-03)", "creation_timestamp": "2024-02-02T08:36:44.000000Z"}, {"uuid": "fe208170-3c6b-4cdc-b781-0e044929be31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/ctinow/177862", "content": "https://ift.tt/eEZ5gI0\nCVE-2024-21794", "creation_timestamp": "2024-02-02T01:31:14.000000Z"}, {"uuid": "55c63a9d-4f98-4803-b99d-a7540e830609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21796", "type": "seen", "source": "https://t.me/ctinow/172490", "content": "https://ift.tt/vheEK0w\nCVE-2024-21796", "creation_timestamp": "2024-01-24T03:26:26.000000Z"}, {"uuid": "5431bfa2-4aee-4c06-8e71-d40f6c41ca36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21793", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10476", "content": "#Threat_Research\n1. Big Vulnerabilities in Next-Gen BIG-IP (CVE-2024-21793, CVE-2024-26026)\nhttps://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip\n2. Analysis of ArcaneDoor Threat Infrastructure\nhttps://censys.com/analysis-of-arcanedoor-threat-infrastructure-suggests-potential-ties-to-chinese-based-actor", "creation_timestamp": "2024-05-18T17:36:28.000000Z"}]}