Cyberoam DPI devices can intercept each other's traffic due to all devices sharing the same CA certificate and private key.
95588c718b17b8b219efc39901118f0ff688f1b6fdbda52a9ca28f4317ac73e4
Whitepaper called Certificate Authority Transparency and Auditability. The goal of this paper is to make it impossible (or at least very difficult) for a Certificate Authority (CA) to issue a certificate for a domain without the knowledge of the owner of that domain. A secondary goal is to protect users as much as possible from mis-issued certificates.
baa285ffbc1c0f086a22438517cd8c203c13124a4eb655414ea8a04b440b3651
Various OpenID Providers (OPs) have TLS server certificates that use weak keys as a result of the Debian predictable random number generator vulnerability.
4ddd04a36c9b48f9c80e6563aa1fa71fc5a92fd3361f08a3b4f6e658063a2112
OpenSSL Security Advisory - Andy Polyakov discovered a flaw in OpenSSL's DTLS implementation which could lead to the compromise of clients and servers with DTLS enabled. All versions of 0.9.8 prior to 0.9.8f are affected. Moritz Jodeit found an off-by-one error in SSL_get_shared_ciphers(), a function that should normally only be used for logging or debugging. All releases of 0.9.8 prior to 0.9.8f and all releases of 0.9.7 prior to 0.9.7m are affected.
7bae0080bc32d9ac211c47bda750e58d9bd0e2dedb613a782848c4bfdeb0e420
Crypt::CBC versions 2.16 and below suffer from a ciphertext weakness when using certain block algorithms.
f911e6164e240e4f4fde21d27cd692bd4c1b77cdb690b5af3dc882147bb16a64