Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481PUBLISHED: 2021-04-10Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020PUBLISHED: 2021-04-10A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194PUBLISHED: 2021-04-09Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195PUBLISHED: 2021-04-09Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
User Rank: Ninja
7/18/2017 | 8:21:33 AM
sites focus tons of effort on identifying their customers. but what do customers do in order to authenticate sites?
we rely on a large list of x.509 certificates -- published by our web browsers -- and most of us -- have no clue what's in that list.
For Critical Sites Only: we all need to COUNTERSIGN trusted certificates using our own PGP/GnuPG key
in the Public Key Model this step is required in order to validate a key. Keys must be validated before a trust level can be assigned.
give this some thought. "They" want to authenticate you -- but -- you need to authenticate them -- and the model we use today -- fails. That's an F