{"vulnerability": "CVE-2024-21794", "sightings": [{"uuid": "6bb2005d-7bd4-4c25-a494-108e8298574c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18497", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21794\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: In Rapid Software LLC's Rapid SCADA versions prior to\u00a0Version 5.8.4,\u00a0an attacker can redirect users to malicious pages through the login page.\n\n\ud83d\udccf Published: 2024-02-01T23:25:57.523Z\n\ud83d\udccf Modified: 2025-06-16T18:16:09.465Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03\n2. https://rapidscada.org/contact/", "creation_timestamp": "2025-06-16T18:38:48.000000Z"}, {"uuid": "ec474b21-8321-474f-b805-b5d784520581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/ctinow/177979", "content": "https://ift.tt/9KQdV71\nCVE-2024-21794 | Rapid SCADA up to 5.8.4 redirect (icsa-24-011-03)", "creation_timestamp": "2024-02-02T08:36:44.000000Z"}, {"uuid": "fe208170-3c6b-4cdc-b781-0e044929be31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21794", "type": "seen", "source": "https://t.me/ctinow/177862", "content": "https://ift.tt/eEZ5gI0\nCVE-2024-21794", "creation_timestamp": "2024-02-02T01:31:14.000000Z"}]}