{"vulnerability": "CVE-2024-43420", "sightings": [{"uuid": "9b795695-2ca1-4af2-bb72-c0ba6478a586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43420", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16246", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43420\n\ud83d\udd25 CVSS Score: 5.7 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2025-05-13T21:03:09.384Z\n\ud83d\udccf Modified: 2025-05-13T21:03:09.384Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html", "creation_timestamp": "2025-05-13T21:31:07.000000Z"}, {"uuid": "a92066c8-55c6-4031-8271-85c122335ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43420", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp3hom6wnib2", "content": "", "creation_timestamp": "2025-05-13T22:08:59.596614Z"}]}