{"vulnerability": "CVE-2024-2550", "sightings": [{"uuid": "91539806-d364-40cc-a84e-6be1f1169f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113477099455726632", "content": "", "creation_timestamp": "2024-11-13T18:38:44.869099Z"}, {"uuid": "4b9af70c-6a37-467d-abae-4288d525fe66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2024-2550", "content": "", "creation_timestamp": "2024-11-13T17:00:00.000000Z"}, {"uuid": "0d31af49-1af9-43a8-8fc4-c9b69f2be00b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113480658530181147", "content": "", "creation_timestamp": "2024-11-14T09:43:51.728361Z"}, {"uuid": "620bf35c-66b8-4a1a-8edd-0429efafbe78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-02", "content": "", "creation_timestamp": "2024-12-03T11:00:00.000000Z"}, {"uuid": "498f09c8-e0d6-44a3-a848-cad90f539af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3ldrinnhowg2m", "content": "", "creation_timestamp": "2024-12-20T23:03:22.580794Z"}, {"uuid": "e6f946cb-3717-4df6-995e-4aa54700893d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lf4alb66dz2r", "content": "", "creation_timestamp": "2025-01-06T23:03:21.318572Z"}, {"uuid": "2ee78848-bbdd-473e-9ce5-55a9cc686c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25501", "type": "seen", "source": "https://t.me/ctinow/203851", "content": "https://ift.tt/ehWDoLg\nCVE-2024-25501", "creation_timestamp": "2024-03-09T09:26:56.000000Z"}, {"uuid": "eb9b56bc-f2b8-42e6-9577-db6d0aa00b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1423", "content": "", "creation_timestamp": "2024-11-18T04:00:00.000000Z"}, {"uuid": "21c95285-866c-45e6-87e3-70faea84d886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25503", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8465", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for CVE-2024-25503\nURL\uff1ahttps://github.com/EQSTLab/CVE-2024-25503\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-06T06:24:41.000000Z"}, {"uuid": "fabfa93a-dc88-4f47-b56f-b2e34fa63d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2550", "type": "seen", "source": "https://t.me/cvedetector/10923", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2550 - Palo Alto Networks PAN-OS GlobalProtect Gateway Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-2550 \nPublished : Nov. 14, 2024, 10:15 a.m. | 17\u00a0minutes ago \nDescription : A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T11:38:14.000000Z"}, {"uuid": "cd3f3234-2e46-48be-b6d1-a5d71031ab56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25501", "type": "seen", "source": "https://t.me/ctinow/203848", "content": "https://ift.tt/ehWDoLg\nCVE-2024-25501", "creation_timestamp": "2024-03-09T09:26:53.000000Z"}, {"uuid": "f9df3da9-a0af-4f72-8455-f7c53f2baad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25502", "type": "seen", "source": "https://t.me/ctinow/185887", "content": "https://ift.tt/snqdfXb\nCVE-2024-25502", "creation_timestamp": "2024-02-15T21:32:12.000000Z"}, {"uuid": "1f2aca9c-e0b3-410e-bb76-db9ea8dd67d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25502", "type": "seen", "source": "https://t.me/ctinow/203103", "content": "https://ift.tt/esDGLVJ\nCVE-2024-25502 | flusity CMS 2.4 download_backup.php path traversal (Issue 10)", "creation_timestamp": "2024-03-08T07:51:38.000000Z"}]}