{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel SUR software versions ant\u00e9rieures \u00e0 2.4.10587","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Optane PMem 100 Series management software versions ant\u00e9rieures \u00e0 01.00.00.3547","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MPI Library versions ant\u00e9rieures \u00e0 2021.10.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Unison software versions ant\u00e9rieures \u00e0 C15","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Trace Analyzer and Collector 2021.10.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SDK pour OpenCL Applications software toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Killer Wi-Fi software version ant\u00e9rieures \u00e0 3.1423.712","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel XTU software versions ant\u00e9rieures \u00e0 7.12.0.29","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilotes Intel QAT software pour Windows versions ant\u00e9rieures \u00e0 QAT1.7-W-1.11.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e g\u00e9n\u00e9ration avec le pilote Intel Thunderbolt DCH toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_06.01.04.002.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions ant\u00e9rieures \u00e0 28.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI AI Analytics Toolkit 2023.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"ACAT software maintenu par Intel versions ant\u00e9rieures \u00e0 2.0.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PROSet/Wireless Wi-Fi software versions ant\u00e9rieures \u00e0 22.240","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Optane PMem 200 Series management software versions ant\u00e9rieures \u00e0 02.00.00.3915","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Threading Building Blocks versions ant\u00e9rieures \u00e0 2021.10.0.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Inspector pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MAS software versions ant\u00e9rieures \u00e0 2.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Optane PMem 300 Series management software versions ant\u00e9rieures \u00e0 03.00.00.0483","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel ISPC versions ant\u00e9rieures \u00e0 1.21.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Toolkit et du programme d'installation des composants versions ant\u00e9rieures \u00e0 4.3.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Installation software pour Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 28.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DSA software versions ant\u00e9rieures \u00e0 23.4.33","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciel du contr\u00f4leur Intel JHL8440 Thunderbolt 4 versions ant\u00e9rieures \u00e0 41","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Binary Configuration Tool software versions ant\u00e9rieures \u00e0 3.4.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX DCAP software pour Windows versions ant\u00e9rieures \u00e0 1.19.100.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SSU software versions ant\u00e9rieures \u00e0 3.0.0.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Unite Client software versions ant\u00e9rieures \u00e0 4.2.35041","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution pour Python 2023.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VROC software versions ant\u00e9rieures \u00e0 8.0.8.1001","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10577","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Advisor pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel QSFP+ Configuration Utility software toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI IoT Toolkit versions ant\u00e9rieures \u00e0 2023.2.0.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PCM software versions ant\u00e9rieures \u00e0 202307","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MPI Library software versions ant\u00e9rieures \u00e0 2021.11","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Cluster Checker 2021.7.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Integrated Performance Primitives 2021.9.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Deep Neural Network Library versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Battery Life Diagnostic Tool software versions ant\u00e9rieures \u00e0 2.3.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Chipset Driver Software versions ant\u00e9rieures \u00e0 10.1.19444.8378","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VTune Profiler pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.8.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilote Intel Thunderbolt DCH pour Windows versions ant\u00e9rieures \u00e0 88","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Optimization pour TensorFlow versions ant\u00e9rieures \u00e0 2.13.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Arm DS software pour Intel SoC FPGA versions ant\u00e9rieures \u00e0 2022.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Installation software pour Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 PLR4 Release","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2023.2.0.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel System Usage Report pour Gameplay Software version 2.0.1901","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PM software toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel OFU software versions ant\u00e9rieures \u00e0 14.1.31","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-27307","url":"https://www.cve.org/CVERecord?id=CVE-2023-27307"},{"name":"CVE-2023-25174","url":"https://www.cve.org/CVERecord?id=CVE-2023-25174"},{"name":"CVE-2023-33875","url":"https://www.cve.org/CVERecord?id=CVE-2023-33875"},{"name":"CVE-2023-28374","url":"https://www.cve.org/CVERecord?id=CVE-2023-28374"},{"name":"CVE-2023-34315","url":"https://www.cve.org/CVERecord?id=CVE-2023-34315"},{"name":"CVE-2023-38135","url":"https://www.cve.org/CVERecord?id=CVE-2023-38135"},{"name":"CVE-2023-40161","url":"https://www.cve.org/CVERecord?id=CVE-2023-40161"},{"name":"CVE-2023-32280","url":"https://www.cve.org/CVERecord?id=CVE-2023-32280"},{"name":"CVE-2022-43703","url":"https://www.cve.org/CVERecord?id=CVE-2022-43703"},{"name":"CVE-2023-39432","url":"https://www.cve.org/CVERecord?id=CVE-2023-39432"},{"name":"CVE-2023-22293","url":"https://www.cve.org/CVERecord?id=CVE-2023-22293"},{"name":"CVE-2023-35121","url":"https://www.cve.org/CVERecord?id=CVE-2023-35121"},{"name":"CVE-2023-35062","url":"https://www.cve.org/CVERecord?id=CVE-2023-35062"},{"name":"CVE-2023-33870","url":"https://www.cve.org/CVERecord?id=CVE-2023-33870"},{"name":"CVE-2023-31189","url":"https://www.cve.org/CVERecord?id=CVE-2023-31189"},{"name":"CVE-2023-28396","url":"https://www.cve.org/CVERecord?id=CVE-2023-28396"},{"name":"CVE-2023-25073","url":"https://www.cve.org/CVERecord?id=CVE-2023-25073"},{"name":"CVE-2023-26596","url":"https://www.cve.org/CVERecord?id=CVE-2023-26596"},{"name":"CVE-2023-26592","url":"https://www.cve.org/CVERecord?id=CVE-2023-26592"},{"name":"CVE-2023-28715","url":"https://www.cve.org/CVERecord?id=CVE-2023-28715"},{"name":"CVE-2023-34983","url":"https://www.cve.org/CVERecord?id=CVE-2023-34983"},{"name":"CVE-2023-38561","url":"https://www.cve.org/CVERecord?id=CVE-2023-38561"},{"name":"CVE-2023-38566","url":"https://www.cve.org/CVERecord?id=CVE-2023-38566"},{"name":"CVE-2023-32647","url":"https://www.cve.org/CVERecord?id=CVE-2023-32647"},{"name":"CVE-2023-35769","url":"https://www.cve.org/CVERecord?id=CVE-2023-35769"},{"name":"CVE-2023-28739","url":"https://www.cve.org/CVERecord?id=CVE-2023-28739"},{"name":"CVE-2023-39425","url":"https://www.cve.org/CVERecord?id=CVE-2023-39425"},{"name":"CVE-2023-28407","url":"https://www.cve.org/CVERecord?id=CVE-2023-28407"},{"name":"CVE-2023-35060","url":"https://www.cve.org/CVERecord?id=CVE-2023-35060"},{"name":"CVE-2023-29153","url":"https://www.cve.org/CVERecord?id=CVE-2023-29153"},{"name":"CVE-2023-22390","url":"https://www.cve.org/CVERecord?id=CVE-2023-22390"},{"name":"CVE-2023-24542","url":"https://www.cve.org/CVERecord?id=CVE-2023-24542"},{"name":"CVE-2022-43701","url":"https://www.cve.org/CVERecord?id=CVE-2022-43701"},{"name":"CVE-2023-41252","url":"https://www.cve.org/CVERecord?id=CVE-2023-41252"},{"name":"CVE-2023-27517","url":"https://www.cve.org/CVERecord?id=CVE-2023-27517"},{"name":"CVE-2023-26591","url":"https://www.cve.org/CVERecord?id=CVE-2023-26591"},{"name":"CVE-2023-28745","url":"https://www.cve.org/CVERecord?id=CVE-2023-28745"},{"name":"CVE-2023-2804","url":"https://www.cve.org/CVERecord?id=CVE-2023-2804"},{"name":"CVE-2023-27300","url":"https://www.cve.org/CVERecord?id=CVE-2023-27300"},{"name":"CVE-2023-24463","url":"https://www.cve.org/CVERecord?id=CVE-2023-24463"},{"name":"CVE-2023-35003","url":"https://www.cve.org/CVERecord?id=CVE-2023-35003"},{"name":"CVE-2023-35061","url":"https://www.cve.org/CVERecord?id=CVE-2023-35061"},{"name":"CVE-2023-32644","url":"https://www.cve.org/CVERecord?id=CVE-2023-32644"},{"name":"CVE-2023-25779","url":"https://www.cve.org/CVERecord?id=CVE-2023-25779"},{"name":"CVE-2023-39941","url":"https://www.cve.org/CVERecord?id=CVE-2023-39941"},{"name":"CVE-2023-26585","url":"https://www.cve.org/CVERecord?id=CVE-2023-26585"},{"name":"CVE-2023-27308","url":"https://www.cve.org/CVERecord?id=CVE-2023-27308"},{"name":"CVE-2023-29162","url":"https://www.cve.org/CVERecord?id=CVE-2023-29162"},{"name":"CVE-2023-24591","url":"https://www.cve.org/CVERecord?id=CVE-2023-24591"},{"name":"CVE-2023-34351","url":"https://www.cve.org/CVERecord?id=CVE-2023-34351"},{"name":"CVE-2023-22342","url":"https://www.cve.org/CVERecord?id=CVE-2023-22342"},{"name":"CVE-2023-26586","url":"https://www.cve.org/CVERecord?id=CVE-2023-26586"},{"name":"CVE-2023-36490","url":"https://www.cve.org/CVERecord?id=CVE-2023-36490"},{"name":"CVE-2023-25769","url":"https://www.cve.org/CVERecord?id=CVE-2023-25769"},{"name":"CVE-2023-41231","url":"https://www.cve.org/CVERecord?id=CVE-2023-41231"},{"name":"CVE-2022-43702","url":"https://www.cve.org/CVERecord?id=CVE-2022-43702"},{"name":"CVE-2023-41091","url":"https://www.cve.org/CVERecord?id=CVE-2023-41091"},{"name":"CVE-2023-36493","url":"https://www.cve.org/CVERecord?id=CVE-2023-36493"},{"name":"CVE-2023-27301","url":"https://www.cve.org/CVERecord?id=CVE-2023-27301"},{"name":"CVE-2023-32651","url":"https://www.cve.org/CVERecord?id=CVE-2023-32651"},{"name":"CVE-2023-41090","url":"https://www.cve.org/CVERecord?id=CVE-2023-41090"},{"name":"CVE-2023-32642","url":"https://www.cve.org/CVERecord?id=CVE-2023-32642"},{"name":"CVE-2023-25951","url":"https://www.cve.org/CVERecord?id=CVE-2023-25951"},{"name":"CVE-2023-30767","url":"https://www.cve.org/CVERecord?id=CVE-2023-30767"},{"name":"CVE-2023-31271","url":"https://www.cve.org/CVERecord?id=CVE-2023-31271"},{"name":"CVE-2023-22311","url":"https://www.cve.org/CVERecord?id=CVE-2023-22311"},{"name":"CVE-2023-32646","url":"https://www.cve.org/CVERecord?id=CVE-2023-32646"},{"name":"CVE-2023-42776","url":"https://www.cve.org/CVERecord?id=CVE-2023-42776"},{"name":"CVE-2023-39932","url":"https://www.cve.org/CVERecord?id=CVE-2023-39932"},{"name":"CVE-2023-25777","url":"https://www.cve.org/CVERecord?id=CVE-2023-25777"},{"name":"CVE-2023-22848","url":"https://www.cve.org/CVERecord?id=CVE-2023-22848"},{"name":"CVE-2023-25945","url":"https://www.cve.org/CVERecord?id=CVE-2023-25945"},{"name":"CVE-2023-24589","url":"https://www.cve.org/CVERecord?id=CVE-2023-24589"},{"name":"CVE-2023-2976","url":"https://www.cve.org/CVERecord?id=CVE-2023-2976"},{"name":"CVE-2023-40154","url":"https://www.cve.org/CVERecord?id=CVE-2023-40154"},{"name":"CVE-2023-32618","url":"https://www.cve.org/CVERecord?id=CVE-2023-32618"},{"name":"CVE-2023-27303","url":"https://www.cve.org/CVERecord?id=CVE-2023-27303"},{"name":"CVE-2023-40156","url":"https://www.cve.org/CVERecord?id=CVE-2023-40156"},{"name":"CVE-2023-24481","url":"https://www.cve.org/CVERecord?id=CVE-2023-24481"},{"name":"CVE-2023-28720","url":"https://www.cve.org/CVERecord?id=CVE-2023-28720"}],"links":[],"reference":"CERTFR-2024-AVI-0124","revisions":[{"description":"Version initiale","revision_date":"2024-02-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">les produits Intel</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01004 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00947 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00992 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00956 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00969 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00993 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00981 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00981.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01003 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00987 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01006 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00959 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01014 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00967 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00954 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00913 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01005 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01005.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00998 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00994 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00994.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00927 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00851 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00948 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00988 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01011 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00958 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00903 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00903.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01000 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00973 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00974 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00974.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00928 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00953 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00955 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00930 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00930.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00895 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00895.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00922 du 13 f\u00e9vrier 2024","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html"}]}
