CERTFR-2023-AVI-0371
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

  • 2023.2 IPU – BIOS
  • DSP Builder pour Intel FPGAs Pro Edition Software
  • Intel NUC BIOS Firmware
  • Intel Connect M Android App
  • Intel DCM Software
  • Intel DCM
  • Intel EMA Configuration Tool and Intel MC Software
  • Intel EMA Software
  • Intel FPGA Firmware
  • Intel IPP Cryptography
  • Intel MacCPUID Software
  • Intel NUC BIOS Update Software
  • Intel NUC Laptop Element Software
  • Intel NUC Pro Software Suite
  • Intel NUC Software Studio Service Installer
  • Intel OFU Software
  • Intel Pathfinder pour RISC-V
  • Intel QAT Driver
  • Intel QAT Engine pour OpenSSL
  • Intel QAT
  • Intel Quartus Prime Pro Software
  • Intel Retail Edge Mobile App
  • Intel SCS Add-on Software Installer
  • Intel SCS Software
  • Intel SUR Software
  • Intel Server Board BMC Firmware
  • Intel Smart Campus Android App
  • Intel Trace Analyzer and Collector Software
  • Intel Unite Android App
  • Intel Unite Client Software
  • Intel Unite Plugin SDK
  • Intel VROC Software
  • Intel VTune™ Profiler
  • Intel i915 Graphics Drivers pour Linux
  • Intel oneAPI Toolkit and Component Software Installers
  • Open CAS
  • WULT Software

Pour plus d'informations, veuillez-vous référer aux avis de l'éditeur.

Impacted products
Vendor Product Description
References
Bulletin de sécurité Intel intel-sa-00809 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00816 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00886 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00797 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00819 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00798 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00796 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00853 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00825 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00771 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00807 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00805 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00855 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00847 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00802 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00692 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00854 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00799 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00785 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00784 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00834 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00792 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00824 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00782 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00778 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00839 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00806 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00772 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00780 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00779 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00788 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00808 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00777 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00832 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00723 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00827 du 09 mai 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00815 du 09 mai 2023 None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003e2023.2 IPU \u2013 BIOS\u003c/li\u003e \u003cli\u003eDSP Builder pour Intel FPGAs Pro Edition Software\u003c/li\u003e \u003cli\u003eIntel NUC BIOS Firmware\u003c/li\u003e \u003cli\u003eIntel Connect M Android App\u003c/li\u003e \u003cli\u003eIntel DCM Software\u003c/li\u003e \u003cli\u003eIntel DCM\u003c/li\u003e \u003cli\u003eIntel EMA Configuration Tool and Intel MC Software\u003c/li\u003e \u003cli\u003eIntel EMA Software\u003c/li\u003e \u003cli\u003eIntel FPGA Firmware\u003c/li\u003e \u003cli\u003eIntel IPP Cryptography\u003c/li\u003e \u003cli\u003eIntel MacCPUID Software\u003c/li\u003e \u003cli\u003eIntel NUC BIOS Update Software\u003c/li\u003e \u003cli\u003eIntel NUC Laptop Element Software\u003c/li\u003e \u003cli\u003eIntel NUC Pro Software Suite\u003c/li\u003e \u003cli\u003eIntel NUC Software Studio Service Installer\u003c/li\u003e \u003cli\u003eIntel OFU Software\u003c/li\u003e \u003cli\u003eIntel Pathfinder pour RISC-V\u003c/li\u003e \u003cli\u003eIntel QAT Driver\u003c/li\u003e \u003cli\u003eIntel QAT Engine pour OpenSSL\u003c/li\u003e \u003cli\u003eIntel QAT\u003c/li\u003e \u003cli\u003eIntel Quartus Prime Pro Software\u003c/li\u003e \u003cli\u003eIntel Retail Edge Mobile App\u003c/li\u003e \u003cli\u003eIntel SCS Add-on Software Installer\u003c/li\u003e \u003cli\u003eIntel SCS Software\u003c/li\u003e \u003cli\u003eIntel SUR Software\u003c/li\u003e \u003cli\u003eIntel Server Board BMC Firmware\u003c/li\u003e \u003cli\u003eIntel Smart Campus Android App\u003c/li\u003e \u003cli\u003eIntel Trace Analyzer and Collector Software\u003c/li\u003e \u003cli\u003eIntel Unite Android App\u003c/li\u003e \u003cli\u003eIntel Unite Client Software\u003c/li\u003e \u003cli\u003eIntel Unite Plugin SDK\u003c/li\u003e \u003cli\u003eIntel VROC Software\u003c/li\u003e \u003cli\u003eIntel VTune\u2122 Profiler\u003c/li\u003e \u003cli\u003eIntel i915 Graphics Drivers pour Linux\u003c/li\u003e \u003cli\u003eIntel oneAPI Toolkit and Component Software Installers\u003c/li\u003e \u003cli\u003eOpen CAS\u003c/li\u003e \u003cli\u003eWULT Software\u003c/li\u003e \u003c/ul\u003e \u003cp\u003ePour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur.\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-23910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23910"
    },
    {
      "name": "CVE-2023-22443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22443"
    },
    {
      "name": "CVE-2022-40974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40974"
    },
    {
      "name": "CVE-2022-41628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41628"
    },
    {
      "name": "CVE-2022-43465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43465"
    },
    {
      "name": "CVE-2022-43475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43475"
    },
    {
      "name": "CVE-2022-25976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25976"
    },
    {
      "name": "CVE-2022-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21239"
    },
    {
      "name": "CVE-2022-40972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40972"
    },
    {
      "name": "CVE-2023-27382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27382"
    },
    {
      "name": "CVE-2022-37409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37409"
    },
    {
      "name": "CVE-2023-22355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22355"
    },
    {
      "name": "CVE-2022-44619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44619"
    },
    {
      "name": "CVE-2022-34855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34855"
    },
    {
      "name": "CVE-2022-41801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41801"
    },
    {
      "name": "CVE-2022-36391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36391"
    },
    {
      "name": "CVE-2023-25175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25175"
    },
    {
      "name": "CVE-2022-41699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41699"
    },
    {
      "name": "CVE-2023-22312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22312"
    },
    {
      "name": "CVE-2022-34848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34848"
    },
    {
      "name": "CVE-2022-46279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46279"
    },
    {
      "name": "CVE-2022-46645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46645"
    },
    {
      "name": "CVE-2023-25771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25771"
    },
    {
      "name": "CVE-2023-22440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22440"
    },
    {
      "name": "CVE-2022-38087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38087"
    },
    {
      "name": "CVE-2022-43507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43507"
    },
    {
      "name": "CVE-2022-32578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32578"
    },
    {
      "name": "CVE-2023-22297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22297"
    },
    {
      "name": "CVE-2023-22447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22447"
    },
    {
      "name": "CVE-2022-45128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45128"
    },
    {
      "name": "CVE-2022-30338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30338"
    },
    {
      "name": "CVE-2023-25776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25776"
    },
    {
      "name": "CVE-2023-22379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22379"
    },
    {
      "name": "CVE-2022-42465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42465"
    },
    {
      "name": "CVE-2022-42878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42878"
    },
    {
      "name": "CVE-2023-23573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23573"
    },
    {
      "name": "CVE-2022-36339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36339"
    },
    {
      "name": "CVE-2022-41982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41982"
    },
    {
      "name": "CVE-2023-27298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27298"
    },
    {
      "name": "CVE-2022-41771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41771"
    },
    {
      "name": "CVE-2023-28410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
    },
    {
      "name": "CVE-2023-25179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25179"
    },
    {
      "name": "CVE-2023-23909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23909"
    },
    {
      "name": "CVE-2022-38787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38787"
    },
    {
      "name": "CVE-2023-27386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27386"
    },
    {
      "name": "CVE-2023-23569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23569"
    },
    {
      "name": "CVE-2022-41769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41769"
    },
    {
      "name": "CVE-2022-38103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38103"
    },
    {
      "name": "CVE-2022-31477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31477"
    },
    {
      "name": "CVE-2022-33894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33894"
    },
    {
      "name": "CVE-2022-28699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28699"
    },
    {
      "name": "CVE-2022-46656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46656"
    },
    {
      "name": "CVE-2022-43474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43474"
    },
    {
      "name": "CVE-2022-41784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41784"
    },
    {
      "name": "CVE-2022-40685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40685"
    },
    {
      "name": "CVE-2023-28411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28411"
    },
    {
      "name": "CVE-2022-41658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41658"
    },
    {
      "name": "CVE-2022-32766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32766"
    },
    {
      "name": "CVE-2022-29919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29919"
    },
    {
      "name": "CVE-2022-38101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38101"
    },
    {
      "name": "CVE-2023-25545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25545"
    },
    {
      "name": "CVE-2022-29508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29508"
    },
    {
      "name": "CVE-2023-22661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22661"
    },
    {
      "name": "CVE-2022-34147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34147"
    },
    {
      "name": "CVE-2022-41690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41690"
    },
    {
      "name": "CVE-2023-22442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22442"
    },
    {
      "name": "CVE-2022-41979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41979"
    },
    {
      "name": "CVE-2022-41693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41693"
    },
    {
      "name": "CVE-2022-25772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25772"
    },
    {
      "name": "CVE-2022-27180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27180"
    },
    {
      "name": "CVE-2022-33963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33963"
    },
    {
      "name": "CVE-2023-24475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24475"
    },
    {
      "name": "CVE-2022-41646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41646"
    },
    {
      "name": "CVE-2022-40207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40207"
    },
    {
      "name": "CVE-2022-32577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32577"
    },
    {
      "name": "CVE-2022-40210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40210"
    },
    {
      "name": "CVE-2022-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21804"
    },
    {
      "name": "CVE-2022-44610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44610"
    },
    {
      "name": "CVE-2022-41621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41621"
    },
    {
      "name": "CVE-2022-41610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41610"
    },
    {
      "name": "CVE-2023-23580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23580"
    },
    {
      "name": "CVE-2022-41687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41687"
    },
    {
      "name": "CVE-2022-32576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32576"
    },
    {
      "name": "CVE-2022-37327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37327"
    },
    {
      "name": "CVE-2022-41998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41998"
    },
    {
      "name": "CVE-2022-41808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41808"
    },
    {
      "name": "CVE-2022-32582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32582"
    }
  ],
  "initial_release_date": "2023-05-10T00:00:00",
  "last_revision_date": "2023-05-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0371",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00809 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00816 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00886 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00797 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00797.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00819 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00798 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00796 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00796.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00853 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00853.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00825 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00825.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00771 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00771.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00807 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00805 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00855 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00855.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00847 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00802 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00692 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00854 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00854.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00799 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00785 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00785.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00784 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00784.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00834 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00792 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00792.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00824 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00782 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00782.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00778 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00839 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00806 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00772 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00772.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00780 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00779 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00788 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00808 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00777 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00832 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00832.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00723 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00723.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00827 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00827.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00815 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00815.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…