Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23270PUBLISHED: 2021-04-12
In Gargoyle OS 1.12.0, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a lo...
CVE-2021-29302PUBLISHED: 2021-04-12TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
CVE-2021-29357PUBLISHED: 2021-04-12The ECT Provider component in OutSystems Platform Server 10 before 10.0.1104.0 and 11 before 11.9.0 (and LifeTime management console before 11.7.0) allows SSRF for arbitrary outbound HTTP requests.
CVE-2021-3125PUBLISHED: 2021-04-12
In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its u...
CVE-2021-3128PUBLISHED: 2021-04-12
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link...
User Rank: Ninja
11/24/2014 | 8:04:16 AM
an invalid certificate or incorrectly selected certificate may look "OK" -- but most of us will be unable to tell if the XYZ Company or the X Y Z Company -- is the correct certificate. combine this with the habit of companies to change things around on occasion and the safety of the x.509 certificate is reduced to Hope and Prayer.
x.509 certificates should be broadcast with magninal trust only.
each of use should vet the certificates we need to use on critical applications -- and then countersign the certificate, bringing it to Full Trust.
Vendors have been attempting to automate the x.509 for customers. But they have made a mess by skipping the Critical Step.
Places like Credit Unions and other Financial offices would provide the "fingerprints" needed to verify a certificate.