diff --git a/clusters/botnet.json b/clusters/botnet.json index 1df05f5..a57b2bf 100644 --- a/clusters/botnet.json +++ b/clusters/botnet.json @@ -697,7 +697,8 @@ "refs": [ "https://en.wikipedia.org/wiki/Mirai_(malware)", "https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/", - "https://www.bleepingcomputer.com/news/security/mirai-iot-malware-uses-aboriginal-linux-to-target-multiple-platforms/" + "https://www.bleepingcomputer.com/news/security/mirai-iot-malware-uses-aboriginal-linux-to-target-multiple-platforms/", + "https://www.bleepingcomputer.com/news/security/new-mirai-variant-comes-with-27-exploits-targets-enterprise-devices/" ] }, "related": [ @@ -1148,5 +1149,5 @@ "value": "Chalubo" } ], - "version": 18 + "version": 19 } diff --git a/clusters/branded_vulnerability.json b/clusters/branded_vulnerability.json index ab15a1f..c4727ef 100644 --- a/clusters/branded_vulnerability.json +++ b/clusters/branded_vulnerability.json @@ -158,7 +158,21 @@ }, "uuid": "3c2325e4-b740-11e8-9504-b32b4d974add", "value": "Blacknurse" + }, + { + "description": "SPOILER is a security vulnerability on modern computer central processing units that uses speculative execution to improve the efficiency of Rowhammer and other related memory and cache attacks. According to reports, all modern Intel CPUs are vulnerable to the attack. AMD has stated that its processors are not vulnerable.", + "meta": { + "refs": [ + "https://arxiv.org/pdf/1903.00446v1.pdf", + "https://appleinsider.com/articles/19/03/05/new-spoiler-vulnerability-in-all-intel-core-processors-exposed-by-researchers", + "https://www.overclock3d.net/news/cpu_mainboard/spoiler_alert_-_intel_cpus_impacted_by_new_vulnerability/1", + "https://www.1e.com/news-insights/blogs/the-spoiler-vulnerability/", + "https://www.bleepingcomputer.com/news/security/amd-believes-spoiler-vulnerability-does-not-impact-its-processors/" + ] + }, + "uuid": "3434339f-ea87-472e-a330-62d2b5cf2c26", + "value": "SPOILER" } ], - "version": 2 + "version": 3 }