We're sorry, the page you were looking for appears to no longer exist, or has been moved.
Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide. CLICK HERE to download and learn more about heightening security when engaging through social media.
03/07/2014 » CVE-2014-1959
lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates. [READ ME]