{"vulnerability": "CVE-2024-12803", "sightings": [{"uuid": "5a4f66f8-c295-44dc-b685-bd24ff4d24ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113822502051441311", "content": "", "creation_timestamp": "2025-01-13T18:39:10.497019Z"}, {"uuid": "34dfbf4f-94c6-4060-b72a-9619ef0e34d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797201168877858", "content": "", "creation_timestamp": "2025-01-09T07:24:49.158049Z"}, {"uuid": "d00d9cbe-3871-4bbb-aacb-2ccd5f385303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcafhps7c2k", "content": "", "creation_timestamp": "2025-01-09T08:16:04.966782Z"}, {"uuid": "672e3125-f5ac-45d8-8d67-188e134743bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfcz4mtwr52q", "content": "", "creation_timestamp": "2025-01-09T15:38:35.415508Z"}, {"uuid": "c4374760-e5a4-4ad7-919e-f996257688db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799182015741245", "content": "", "creation_timestamp": "2025-01-09T15:48:34.572755Z"}, {"uuid": "5a869bf7-640b-4807-9a02-4687bb0035d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113789285485490767", "content": "", "creation_timestamp": "2025-01-07T21:51:45.512416Z"}, {"uuid": "81553964-e6b0-4573-9e0d-056b0bbcf911", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/602ffeaf-2425-48cc-967c-0efad9629dd0", "content": "", "creation_timestamp": "2025-01-07T12:38:58.150623Z"}, {"uuid": "da9e47c4-ddc4-4837-b32d-b931e933d4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/960", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12803\n\ud83d\udd39 Description: A post-authentication stack-based buffer overflow vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution.\n\ud83d\udccf Published: 2025-01-09T07:21:53.799Z\n\ud83d\udccf Modified: 2025-01-09T14:56:12.273Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0004", "creation_timestamp": "2025-01-09T15:14:45.000000Z"}, {"uuid": "fd4ffadd-398d-45a4-a259-de01b8a5855f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12803", "type": "seen", "source": "https://t.me/cvedetector/14819", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12803 - SonicOS Remote Code Execution Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12803 \nPublished : Jan. 9, 2025, 8:15 a.m. | 40\u00a0minutes ago \nDescription : A post-authentication stack-based buffer overflow vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T10:14:05.000000Z"}]}