Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-295
Total 821 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-2901 1 Wolfssl 1 Wolfssl 2019-12-04 5.0 MEDIUM 7.5 HIGH
wolfssl before 3.2.0 does not properly issue certificates for a server's hostname.
CVE-2014-2902 1 Wolfssl 1 Wolfssl 2019-12-04 5.0 MEDIUM 7.5 HIGH
wolfssl before 3.2.0 does not properly authorize CA certificate for signing other certificates.
CVE-2014-8167 1 Redhat 3 Enterprise Virtualization, Vdsclient, Virtual Desktop Server Manager 2019-11-15 4.3 MEDIUM 5.9 MEDIUM
vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack
CVE-2014-7143 1 Twistedmatrix 1 Twisted 2019-11-14 5.0 MEDIUM 7.5 HIGH
Python Twisted 14.0 trustRoot is not respected in HTTP client
CVE-2009-3552 1 Redhat 1 Enterprise Virtualization Manager 2019-11-12 2.9 LOW 3.1 LOW
In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat Enterprise Virtualization Manager. An attacker on the local network could use this flaw to conduct a man-in-the-middle attack, tricking the user into thinking they are viewing the Red Hat Enterprise Virtualization Manager when the content is actually attacker-controlled, or modifying actions a user requested Red Hat Enterprise Virtualization Manager to perform.
CVE-2019-16209 1 Broadcom 1 Brocade Sannav 2019-11-09 5.8 MEDIUM 7.4 HIGH
A vulnerability, in The ReportsTrustManager class of Brocade SANnav versions before v2.0, could allow an attacker to perform a man-in-the-middle attack against Secure Sockets Layer(SSL)connections.
CVE-2019-3685 1 Opensuse 1 Open Build Service 2019-11-08 6.8 MEDIUM 7.7 HIGH
Open Build Service before version 0.165.4 diddn't validate TLS certificates for HTTPS connections with the osc client binary
CVE-2013-2255 3 Debian, Openstack, Redhat 4 Debian Linux, Compute, Keystone and 1 more 2019-11-07 4.3 MEDIUM 5.9 MEDIUM
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.
CVE-2019-18632 1 Europa 1 Eidas-node Integration Package 2019-11-05 7.5 HIGH 9.8 CRITICAL
European Commission eIDAS-Node Integration Package before 2.3.1 allows Certificate Faking because an attacker can sign a manipulated SAML response with a forged certificate.
CVE-2019-18633 1 Europa 1 Eidas-node Integration Package 2019-11-05 7.5 HIGH 9.8 CRITICAL
European Commission eIDAS-Node Integration Package before 2.3.1 has Missing Certificate Validation because a certain ExplicitKeyTrustEvaluator return value is not checked. NOTE: only 2.1 is confirmed to be affected.
CVE-2010-4237 1 Mercurial 1 Mercurial 2019-10-30 4.3 MEDIUM 5.9 MEDIUM
Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.
CVE-2019-11674 1 Microfocus 1 Netiq Self Service Password Reset 2019-10-24 4.3 MEDIUM 5.9 MEDIUM
Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack.
CVE-2019-10446 1 Jenkins 1 Cadence Vmanager 2019-10-18 6.4 MEDIUM 8.2 HIGH
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
CVE-2019-10444 1 Jenkins 1 Bumblebee Hp Alm 2019-10-18 6.4 MEDIUM 6.5 MEDIUM
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM.
CVE-2019-5506 1 Netapp 1 Clustered Data Ontap 2019-10-17 4.3 MEDIUM 5.9 MEDIUM
Clustered Data ONTAP versions 9.0 and higher do not enforce hostname verification under certain circumstances making them susceptible to impersonation via man-in-the-middle attacks.
CVE-2019-0054 1 Juniper 25 Csrx, Junos, Srx100 and 22 more 2019-10-17 5.8 MEDIUM 7.4 HIGH
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
CVE-2019-3841 1 Kubevirt 1 Containerized Data Importer 2019-10-09 4.9 MEDIUM 6.8 MEDIUM
Kubevirt/virt-cdi-importer, versions 1.4.0 to 1.5.3 inclusive, were reported to disable TLS certificate validation when importing data into PVCs from container registries. This could enable man-in-the-middle attacks between a container registry and the virt-cdi-component, leading to possible undetected tampering of trusted container image content.
CVE-2019-3777 1 Pivotal Software 1 Application Service 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
Pivotal Application Service (PAS), versions 2.2.x prior to 2.2.12, 2.3.x prior to 2.3.7 and 2.4.x prior to 2.4.3, contain apps manager that uses a cloud controller proxy that fails to verify SSL certs. A remote unauthenticated attacker that could hijack the Cloud Controller's DNS record could intercept access tokens sent to the Cloud Controller, giving the attacker access to the user's resources in the Cloud Controller
CVE-2019-3890 2 Gnome, Redhat 2 Evolution-ews, Enterprise Linux 2019-10-09 5.8 MEDIUM 8.1 HIGH
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
CVE-2019-3875 1 Redhat 2 Keycloak, Single Sign-on 2019-10-09 5.8 MEDIUM 4.8 MEDIUM
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.