{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel ISH software for 11th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.1.4479","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel ISH software for Intel NUC M15 Laptop Kits LAPBC710 and LAPBC510 versions ant\u00e9rieures \u00e0 5.4.1.4479","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgLnx software versions ant\u00e9rieures \u00e0 5.05.04.0008","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Advisor software versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"LAPAC71G and LAPAC71H versions ant\u00e9rieures \u00e0 0065","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2022.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Base Toolkits versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel(R) Ethernet Controllers E800 Series with NVM image versions 4.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEditLnx software versions ant\u00e9rieures \u00e0 5.27.06.0019","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Quartus Prime Pro Edition Design software versions ant\u00e9rieures \u00e0 23.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEdit-Win software versions ant\u00e9rieures \u00e0 5.27.03.0006","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution pour Python pour Windows versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MPI Library versions ant\u00e9rieures \u00e0 2021.12","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MAS (GUI) versions ant\u00e9rieures \u00e0 2.5.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Simics Package Manager software versions ant\u00e9rieures \u00e0 1.8.3.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Fortran Compiler versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgWin software versions ant\u00e9rieures \u00e0 5.05.04.0008","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Agilex FPGA 7 FPGA firmware versions ant\u00e9rieures \u00e0 24.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC X15 Laptop","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"LAPKC51E, LAPKC71E, LAPKC71F versions ant\u00e9rieures \u00e0 0048","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel High Level Synthesis Compiler software versions ant\u00e9rieures \u00e0 23.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel FPGA SDK for OpenCL software technology, toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC M15 Laptop Kits: LAPRC710, LAPRC510","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel IPP Cryptography software versions ant\u00e9rieures \u00e0 2021.11","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVLnx software versions ant\u00e9rieures \u00e0 5.13.00.2106","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Ethernet Adapter Complete Driver Pack software versions ant\u00e9rieures \u00e0 28.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel HID Event Filter software versions ant\u00e9rieures \u00e0 2.2.2.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Connectivity Performance Suite software versions ant\u00e9rieures \u00e0 2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC X15 Laptop Kits: LAPAC71G, LAPAC71H, LAPKC71F, LAPKC71E, LAPKC51E.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10717","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1.0.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel(R) Ethernet Controllers E800 Series avec des versions ant\u00e9rieures \u00e0 NIC1.3 PV, NVM avec versions d'images avant 3.36 et Intel(R) Ethernet Complete Driver Pack 28.3.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.1.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Flexlm License Daemons for Intel FPGA Software version v11.19.5.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Quartus Prime Pro Edition Design Software versions ant\u00e9rieures \u00e0 24.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel ISH software for 12th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.2.4594","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC M15 Laptop Kits: LAPBC710, LAPBC510, LAPRC710, LAPRC510","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Unite Client Extended Display Plugin software installer, toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DPC++ C++ Compiler software versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel(R) Ethernet Complete Driver Pack versions ant\u00e9rieures \u00e0 28.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Arc Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.4824","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel TDX module software versions 1.5.05.46.698","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Integrated Performance Primitive versions ant\u00e9rieures \u00e0 2021.11","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"LAPRC510, LAPRC710 versions ant\u00e9rieures \u00e0 0066","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Data Center GPU Max Series 1100 et 1550","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Base Toolkit software versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution pour GDB software versions ant\u00e9rieures \u00e0 2024.0.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVWin software versions ant\u00e9rieures \u00e0 5.13.00.2109","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"LAPBC510 and LAPBC710 versions ant\u00e9rieures \u00e0 0083","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"BMRA software versions ant\u00e9rieures \u00e0 22.08","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Graphics Performance Analyzers (Intel GPA) software versions ant\u00e9rieures \u00e0 2023.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel License Manager for FLEXlm product versions ant\u00e9rieures \u00e0 11.19.5.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"VTune Profiler versions ant\u00e9rieures \u00e0 VTune 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeurs Intel Xeon Scalable de 4\u00e8me et 5\u00e8me g\u00e9n\u00e9ration","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VROC versions ant\u00e9rieures \u00e0 8.6.0.1191","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel GPA software versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel TDX module software versions ant\u00e9rieures \u00e0 TDX 1.5.01.00.592","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2024.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel ISH software for Intel NUC M15 Laptop Kits LAPRC710 and LAPRC510 versions ant\u00e9rieures \u00e0 5.4.2.4594","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2024-23495","url":"https://www.cve.org/CVERecord?id=CVE-2024-23495"},{"name":"CVE-2024-21801","url":"https://www.cve.org/CVERecord?id=CVE-2024-21801"},{"name":"CVE-2024-21844","url":"https://www.cve.org/CVERecord?id=CVE-2024-21844"},{"name":"CVE-2024-23497","url":"https://www.cve.org/CVERecord?id=CVE-2024-23497"},{"name":"CVE-2023-45230","url":"https://www.cve.org/CVERecord?id=CVE-2023-45230"},{"name":"CVE-2024-21784","url":"https://www.cve.org/CVERecord?id=CVE-2024-21784"},{"name":"CVE-2022-36763","url":"https://www.cve.org/CVERecord?id=CVE-2022-36763"},{"name":"CVE-2023-39539","url":"https://www.cve.org/CVERecord?id=CVE-2023-39539"},{"name":"CVE-2024-21857","url":"https://www.cve.org/CVERecord?id=CVE-2024-21857"},{"name":"CVE-2024-24980","url":"https://www.cve.org/CVERecord?id=CVE-2024-24980"},{"name":"CVE-2024-21787","url":"https://www.cve.org/CVERecord?id=CVE-2024-21787"},{"name":"CVE-2024-26027","url":"https://www.cve.org/CVERecord?id=CVE-2024-26027"},{"name":"CVE-2024-27461","url":"https://www.cve.org/CVERecord?id=CVE-2024-27461"},{"name":"CVE-2023-34424","url":"https://www.cve.org/CVERecord?id=CVE-2023-34424"},{"name":"CVE-2023-38655","url":"https://www.cve.org/CVERecord?id=CVE-2023-38655"},{"name":"CVE-2024-23491","url":"https://www.cve.org/CVERecord?id=CVE-2024-23491"},{"name":"CVE-2024-23499","url":"https://www.cve.org/CVERecord?id=CVE-2024-23499"},{"name":"CVE-2023-45229","url":"https://www.cve.org/CVERecord?id=CVE-2023-45229"},{"name":"CVE-2023-45234","url":"https://www.cve.org/CVERecord?id=CVE-2023-45234"},{"name":"CVE-2023-45236","url":"https://www.cve.org/CVERecord?id=CVE-2023-45236"},{"name":"CVE-2024-24983","url":"https://www.cve.org/CVERecord?id=CVE-2024-24983"},{"name":"CVE-2024-28947","url":"https://www.cve.org/CVERecord?id=CVE-2024-28947"},{"name":"CVE-2024-28887","url":"https://www.cve.org/CVERecord?id=CVE-2024-28887"},{"name":"CVE-2024-25939","url":"https://www.cve.org/CVERecord?id=CVE-2024-25939"},{"name":"CVE-2024-29015","url":"https://www.cve.org/CVERecord?id=CVE-2024-29015"},{"name":"CVE-2024-25576","url":"https://www.cve.org/CVERecord?id=CVE-2024-25576"},{"name":"CVE-2024-21769","url":"https://www.cve.org/CVERecord?id=CVE-2024-21769"},{"name":"CVE-2024-24986","url":"https://www.cve.org/CVERecord?id=CVE-2024-24986"},{"name":"CVE-2024-28046","url":"https://www.cve.org/CVERecord?id=CVE-2024-28046"},{"name":"CVE-2023-35061","url":"https://www.cve.org/CVERecord?id=CVE-2023-35061"},{"name":"CVE-2024-34163","url":"https://www.cve.org/CVERecord?id=CVE-2024-34163"},{"name":"CVE-2024-24973","url":"https://www.cve.org/CVERecord?id=CVE-2024-24973"},{"name":"CVE-2024-26025","url":"https://www.cve.org/CVERecord?id=CVE-2024-26025"},{"name":"CVE-2023-45231","url":"https://www.cve.org/CVERecord?id=CVE-2023-45231"},{"name":"CVE-2022-29871","url":"https://www.cve.org/CVERecord?id=CVE-2022-29871"},{"name":"CVE-2023-43747","url":"https://www.cve.org/CVERecord?id=CVE-2023-43747"},{"name":"CVE-2023-45237","url":"https://www.cve.org/CVERecord?id=CVE-2023-45237"},{"name":"CVE-2023-40067","url":"https://www.cve.org/CVERecord?id=CVE-2023-40067"},{"name":"CVE-2024-28050","url":"https://www.cve.org/CVERecord?id=CVE-2024-28050"},{"name":"CVE-2024-21810","url":"https://www.cve.org/CVERecord?id=CVE-2024-21810"},{"name":"CVE-2023-49141","url":"https://www.cve.org/CVERecord?id=CVE-2023-49141"},{"name":"CVE-2023-45233","url":"https://www.cve.org/CVERecord?id=CVE-2023-45233"},{"name":"CVE-2023-45232","url":"https://www.cve.org/CVERecord?id=CVE-2023-45232"},{"name":"CVE-2024-25562","url":"https://www.cve.org/CVERecord?id=CVE-2024-25562"},{"name":"CVE-2024-23907","url":"https://www.cve.org/CVERecord?id=CVE-2024-23907"},{"name":"CVE-2024-23908","url":"https://www.cve.org/CVERecord?id=CVE-2024-23908"},{"name":"CVE-2024-21807","url":"https://www.cve.org/CVERecord?id=CVE-2024-21807"},{"name":"CVE-2023-35123","url":"https://www.cve.org/CVERecord?id=CVE-2023-35123"},{"name":"CVE-2024-24977","url":"https://www.cve.org/CVERecord?id=CVE-2024-24977"},{"name":"CVE-2024-21806","url":"https://www.cve.org/CVERecord?id=CVE-2024-21806"},{"name":"CVE-2024-24580","url":"https://www.cve.org/CVERecord?id=CVE-2024-24580"},{"name":"CVE-2024-22184","url":"https://www.cve.org/CVERecord?id=CVE-2024-22184"},{"name":"CVE-2024-23909","url":"https://www.cve.org/CVERecord?id=CVE-2024-23909"},{"name":"CVE-2023-49144","url":"https://www.cve.org/CVERecord?id=CVE-2023-49144"},{"name":"CVE-2023-48361","url":"https://www.cve.org/CVERecord?id=CVE-2023-48361"},{"name":"CVE-2024-39283","url":"https://www.cve.org/CVERecord?id=CVE-2024-39283"},{"name":"CVE-2024-23489","url":"https://www.cve.org/CVERecord?id=CVE-2024-23489"},{"name":"CVE-2023-43489","url":"https://www.cve.org/CVERecord?id=CVE-2023-43489"},{"name":"CVE-2024-25561","url":"https://www.cve.org/CVERecord?id=CVE-2024-25561"},{"name":"CVE-2024-22374","url":"https://www.cve.org/CVERecord?id=CVE-2024-22374"},{"name":"CVE-2023-42667","url":"https://www.cve.org/CVERecord?id=CVE-2023-42667"},{"name":"CVE-2024-21766","url":"https://www.cve.org/CVERecord?id=CVE-2024-21766"},{"name":"CVE-2024-23974","url":"https://www.cve.org/CVERecord?id=CVE-2024-23974"},{"name":"CVE-2024-26022","url":"https://www.cve.org/CVERecord?id=CVE-2024-26022"},{"name":"CVE-2024-28172","url":"https://www.cve.org/CVERecord?id=CVE-2024-28172"},{"name":"CVE-2024-28876","url":"https://www.cve.org/CVERecord?id=CVE-2024-28876"},{"name":"CVE-2024-24853","url":"https://www.cve.org/CVERecord?id=CVE-2024-24853"},{"name":"CVE-2023-45235","url":"https://www.cve.org/CVERecord?id=CVE-2023-45235"},{"name":"CVE-2024-22378","url":"https://www.cve.org/CVERecord?id=CVE-2024-22378"},{"name":"CVE-2024-23981","url":"https://www.cve.org/CVERecord?id=CVE-2024-23981"},{"name":"CVE-2024-28953","url":"https://www.cve.org/CVERecord?id=CVE-2024-28953"},{"name":"CVE-2024-22376","url":"https://www.cve.org/CVERecord?id=CVE-2024-22376"}],"links":[],"reference":"CERTFR-2024-AVI-0679","revisions":[{"description":"Version initiale","revision_date":"2024-08-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01102","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01102.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01172","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01172.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01116","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01116.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01129","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00790","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00790.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01070","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01106","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01106.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01089","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01089.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01121","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01038","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01113","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01113.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01057","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01046","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01088","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01088.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01122","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01164","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01164.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01130","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01107","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01107.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01127","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01127.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01112","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01112.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01075","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01095","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01095.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01115","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01115.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01010","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01010.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01126","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01126.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01128","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01128.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01087","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01114","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01114.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01094","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01094.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00999","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01083","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01117","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01117.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01073","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01073.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00918","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01105","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01078","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01125","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01125.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01072","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01072.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01104","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01104.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01100","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01118","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html"},{"published_at":"2024-08-13","title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01110","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html"}]}
