{"vulnerability": "CVE-2023-28746", "sightings": [{"uuid": "54e5459f-9c66-417f-a5be-5ec119d28fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/arpsyndicate/4260", "content": "#ExploitObserverAlert\n\nCVE-2023-28746\n\nDESCRIPTION: Exploit Observer has 67 entries in 7 file formats related to CVE-2023-28746. Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-03-16T21:27:43.000000Z"}, {"uuid": "0a0c27ad-e320-4fff-b8c4-cbc432d741bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208004", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:22:38.000000Z"}, {"uuid": "b2511e4a-4d84-46cf-a44c-c3847e4944cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://gist.github.com/alanc/ae834f8047eb234c68cf9b4db4a96958", "content": "", "creation_timestamp": "2025-08-19T21:03:01.000000Z"}, {"uuid": "2bce2f7c-8690-46be-b9fc-0adf123e717e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28746\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2024-03-14T16:45:50.370Z\n\ud83d\udccf Modified: 2025-04-26T20:03:13.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/\n5. http://www.openwall.com/lists/oss-security/2024/03/12/13\n6. https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html\n7. https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "creation_timestamp": "2025-04-26T20:08:34.000000Z"}, {"uuid": "8e1b0fa1-346d-42ee-900a-ccdbdf998062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208021", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:26:53.000000Z"}]}