Vulnerabilities > Improper Certificate Validation

DATE CVE VULNERABILITY TITLE RISK
2012-11-04 CVE-2012-5821 Improper Certificate Validation vulnerability in multiple products
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
network
high complexity
lynx canonical CWE-295
5.9
2012-11-04 CVE-2012-5819 Improper Certificate Validation vulnerability in Filesanywhere
FilesAnywhere does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
network
high complexity
filesanywhere CWE-295
7.4
2012-11-04 CVE-2012-5817 Improper Certificate Validation vulnerability in multiple products
Codehaus XFire 1.2.6 and earlier, as used in the Amazon EC2 API Tools Java library and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
network
high complexity
amazon codehaus CWE-295
7.4
2012-11-04 CVE-2012-5810 Improper Certificate Validation vulnerability in Jpmorganchase Chase Mobile
The Chase mobile banking application for Android does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to overriding the default X509TrustManager.
network
high complexity
jpmorganchase CWE-295
5.9
2012-11-04 CVE-2012-3446 Improper Certificate Validation vulnerability in Apache Libcloud
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
network
high complexity
apache CWE-295
5.9
2012-09-18 CVE-2012-2993 Improper Certificate Validation vulnerability in Microsoft Windows Phone 7 Firmware
Microsoft Windows Phone 7 does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL server for the (1) POP3, (2) IMAP, or (3) SMTP protocol via an arbitrary valid certificate.
network
high complexity
microsoft CWE-295
5.9
2011-06-24 CVE-2011-0199 Improper Certificate Validation vulnerability in Apple mac OS X and mac OS X Server
The Certificate Trust Policy component in Apple Mac OS X before 10.6.8 does not perform CRL checking for Extended Validation (EV) certificates that lack OCSP URLs, which might allow man-in-the-middle attackers to spoof an SSL server via a revoked certificate.
network
high complexity
apple CWE-295
5.9
2010-11-15 CVE-2010-1378 Improper Certificate Validation vulnerability in Apple mac OS X and mac OS X Server
OpenSSL in Apple Mac OS X 10.6.x before 10.6.5 does not properly perform arithmetic, which allows remote attackers to bypass X.509 certificate authentication via an arbitrary certificate issued by a legitimate Certification Authority.
network
low complexity
apple CWE-295
critical
9.8
2009-09-02 CVE-2009-3046 Improper Certificate Validation vulnerability in Opera Browser
Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certificate.
network
low complexity
opera CWE-295
7.5
2009-07-30 CVE-2009-2408 Improper Certificate Validation vulnerability in multiple products
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
network
high complexity
mozilla suse opensuse debian canonical CWE-295
5.9