From a1a24d2b34be589cfa6807c214dea286cc5f1c52 Mon Sep 17 00:00:00 2001 From: Jericho <3095424+attritionorg@users.noreply.github.com> Date: Mon, 18 Nov 2019 20:36:41 -0700 Subject: [PATCH] fix typo in CVE for Foreshadow, add second common name for 2018-3639 --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index fc184e8..a8748c9 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # SpecuCheck -SpecuCheck is a Windows utility for checking the state of the software and hardware mitigations against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4). It uses two new information classes that were added to the NtQuerySystemInformation API call as part of the recent patches introduced in January 2018 and reports the data as seen by the Windows Kernel. +SpecuCheck is a Windows utility for checking the state of the software and hardware mitigations against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3620 (Foreshadow), and CVE-2018-3639 (Spectre v4 / SPECTRE-NG). It uses two new information classes that were added to the NtQuerySystemInformation API call as part of the recent patches introduced in January 2018 and reports the data as seen by the Windows Kernel. An [official](https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe) Microsoft Powershell Cmdlet Module now exists as well, which is the recommended and supported way to get this information.