{"vulnerability": "CVE-2023-4895", "sightings": [{"uuid": "03803ca9-4d6b-4dc3-9218-60534a667453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48957", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7626", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48957\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: PureVPN Linux client 2.0.2-Productions fails to properly handle DNS queries, allowing them to bypass the VPN tunnel and be sent directly to the ISP or default DNS servers.\n\ud83d\udccf Published: 2024-08-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T19:42:12.116Z\n\ud83d\udd17 References:\n1. https://www.rafaybaloch.com/2023/11/Multiple%20Critical-Vulnerabilities-in-PureVPN.html?m=1\n2. https://latesthackingnews.com/2023/11/13/multiple-vulnerabilities-found-in-purevpn-one-remains-unpatched/", "creation_timestamp": "2025-03-14T19:44:54.000000Z"}, {"uuid": "3f57780a-854a-459b-91ea-5c4903bded7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48957", "type": "seen", "source": "https://t.me/cvedetector/4089", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-48957 - PureVPN Linux client DNS Tunnel Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-48957 \nPublished : Aug. 25, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : PureVPN Linux client 2.0.2-Productions fails to properly handle DNS queries, allowing them to bypass the VPN tunnel and be sent directly to the ISP or default DNS servers. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-25T20:08:49.000000Z"}, {"uuid": "7ef71102-3f3c-4a49-95e5-d8bf39102cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48958", "type": "seen", "source": "https://t.me/arpsyndicate/4559", "content": "#ExploitObserverAlert\n\nCVE-2023-48958\n\nDESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to CVE-2023-48958. gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5947312", "creation_timestamp": "2024-04-12T08:02:06.000000Z"}, {"uuid": "3190c82e-f247-403b-bb37-b36cf05328ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4895", "type": "seen", "source": "https://t.me/ctinow/190342", "content": "https://ift.tt/SO81dNC\nCVE-2023-4895", "creation_timestamp": "2024-02-22T02:26:53.000000Z"}, {"uuid": "25487ac1-eb65-4891-8486-2b2e22283f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4895", "type": "seen", "source": "https://t.me/ctinow/190339", "content": "https://ift.tt/SO81dNC\nCVE-2023-4895", "creation_timestamp": "2024-02-22T02:21:47.000000Z"}, {"uuid": "385e942d-e9d8-4b97-8076-3e9a8de21eb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48958", "type": "seen", "source": "https://t.me/ctinow/161020", "content": "https://ift.tt/dKVsi0T\nCVE-2023-48958 | GPAC 2.3-DEV-rev617-g671976fcc-master media_tools/mpd.c gf_mpd_resolve_url memory leak (Issue 2689)", "creation_timestamp": "2023-12-31T09:16:18.000000Z"}, {"uuid": "87dbecd1-c1aa-460a-b5ca-8bfef63a6f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48952", "type": "seen", "source": "https://t.me/ctinow/157035", "content": "https://ift.tt/8BEx1NX\nCVE-2023-48952 | openlink virtuoso-opensource 7.2.11 SELECT Statement box_deserialize_reusing denial of service (Issue 1175)", "creation_timestamp": "2023-12-20T14:46:26.000000Z"}, {"uuid": "e4ccdbbd-ff27-48e4-9a1a-8a6ec83843be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48951", "type": "seen", "source": "https://t.me/ctinow/157034", "content": "https://ift.tt/qE9I5hZ\nCVE-2023-48951 | openlink virtuoso-opensource 7.2.11 SELECT Statement box_equal denial of service (Issue 1177)", "creation_timestamp": "2023-12-20T14:46:25.000000Z"}]}