{"vulnerability": "CVE-2024-40765", "sightings": [{"uuid": "71c6af42-5e3d-4aea-9ae7-96aa9830fa32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113822502051441311", "content": "", "creation_timestamp": "2025-01-13T18:39:10.358431Z"}, {"uuid": "8eb6d47d-b887-4a1b-9f06-97a8851552fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797201184696821", "content": "", "creation_timestamp": "2025-01-09T07:24:50.243140Z"}, {"uuid": "c4cf50dc-2b91-412e-9280-beb366a84ab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcafovvci25", "content": "", "creation_timestamp": "2025-01-09T08:16:12.669636Z"}, {"uuid": "7b123129-ff3b-4464-bca9-59173de128ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfcz4lyz7r2r", "content": "", "creation_timestamp": "2025-01-09T15:38:32.271518Z"}, {"uuid": "6e7cb828-6d22-47f7-8976-3d037c70af33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799182095601157", "content": "", "creation_timestamp": "2025-01-09T15:48:35.738164Z"}, {"uuid": "3fb4666d-8043-4996-a198-dff6c3c4d05f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113789285485490767", "content": "", "creation_timestamp": "2025-01-07T21:51:45.625044Z"}, {"uuid": "7c77412a-9374-49ac-9fa6-1fc65dcc9867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/602ffeaf-2425-48cc-967c-0efad9629dd0", "content": "", "creation_timestamp": "2025-01-07T12:38:58.150623Z"}, {"uuid": "0adc7cb5-4844-47fb-a755-39aad9bd94b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40765\n\ud83d\udd39 Description: An Integer-based buffer overflow vulnerability in the SonicOS via IPSec allows a remote attacker in specific conditions to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a specially crafted IKEv2 payload.\n\ud83d\udccf Published: 2025-01-09T07:12:40.644Z\n\ud83d\udccf Modified: 2025-01-09T14:58:28.792Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0013", "creation_timestamp": "2025-01-09T15:14:37.000000Z"}]}