Vulnerabilities (CVE)

Filtered by CWE-295
Total 976 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-4830 1 Akindo-sushiro 1 Sushiro 2021-04-01 4.3 MEDIUM 5.9 MEDIUM
Sushiro App for iOS 2.1.16 and earlier and Sushiro App for Android 2.1.16.1 and earlier do not verify SSL certificates.
CVE-2021-21373 1 Nim-lang 1 Nim 2021-03-31 4.3 MEDIUM 5.9 MEDIUM
Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
CVE-2021-21374 1 Nim-lang 1 Nim 2021-03-30 6.8 MEDIUM 8.1 HIGH
Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
CVE-2021-21385 1 Mifos 1 Mifos-mobile 2021-03-30 5.8 MEDIUM 7.4 HIGH
Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks. This problem is fixed in mifos-mobile commit e505f62.
CVE-2020-29457 1 Opcfoundation 1 Ua-.netstandard 2021-03-26 2.1 LOW 4.4 MEDIUM
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection.
CVE-2021-27257 1 Netgear 86 Br200, Br200 Firmware, Br500 and 83 more 2021-03-17 3.3 LOW 6.5 MEDIUM
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via FTP. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-12362.
CVE-2021-27098 1 Cncf 1 Spire 2021-03-16 5.5 MEDIUM 8.1 HIGH
In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1.
CVE-2021-22189 1 Gitlab 1 Gitlab 2021-03-10 6.5 MEDIUM 7.2 HIGH
Starting with version 13.7 the Gitlab CE/EE editions were affected by a security issue related to the validation of the certificates for the Fortinet OTP that could result in authentication issues.
CVE-2021-3336 1 Wolfssl 1 Wolfssl 2021-03-04 6.8 MEDIUM 8.1 HIGH
DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers.
CVE-2020-13163 1 Em-imap Project 1 Em-imap 2021-03-04 5.8 MEDIUM 7.4 HIGH
em-imap 0.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVE-2020-24393 1 Tweetstream Project 1 Tweetstream 2021-03-01 4.3 MEDIUM 5.9 MEDIUM
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
CVE-2021-27189 1 Cira 1 Canadian Shield 2021-02-26 4.3 MEDIUM 5.9 MEDIUM
The CIRA Canadian Shield app before 4.0.13 for iOS lacks SSL Certificate Validation.
CVE-2020-24392 1 Twitter-stream Project 1 Twitter-stream 2021-02-25 4.3 MEDIUM 5.9 MEDIUM
In voloko twitter-stream 0.1.10, missing TLS hostname validation allows an attacker to perform a man-in-the-middle attack against users of the library (because eventmachine is misused).
CVE-2021-26911 2 Canarymail, Libmailcore 2 Canary Mail, Mailcore2 2021-02-24 5.8 MEDIUM 7.4 HIGH
core/imap/MCIMAPSession.cpp in Canary Mail before 3.22 has Missing SSL Certificate Validation for IMAP in STARTTLS mode.
CVE-2014-0363 1 Igniterealtime 1 Smack 2021-02-23 5.8 MEDIUM N/A
The ServerTrustManager component in the Ignite Realtime Smack XMPP API before 4.0.0-rc1 does not verify basicConstraints and nameConstraints in X.509 certificate chains from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate chain.
CVE-2019-17007 2 Mozilla, Siemens 17 Network Security Services, Ruggedcom Rox Mx5000, Ruggedcom Rox Mx5000 Firmware and 14 more 2021-02-19 5.0 MEDIUM 7.5 HIGH
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
CVE-2021-20649 1 Elecom 2 Wrc-300febk-s, Wrc-300febk-s Firmware 2021-02-15 5.8 MEDIUM 4.8 MEDIUM
ELECOM WRC-300FEBK-S contains an improper certificate validation vulnerability. Via a man-in-the-middle attack, an attacker may alter the communication response. As a result, an arbitrary OS command may be executed on the affected device.
CVE-2021-0341 1 Google 1 Android 2021-02-12 5.0 MEDIUM 7.5 HIGH
In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069
CVE-2020-5812 1 Tenable 1 Nessus Amazon Machine Image 2021-02-10 4.3 MEDIUM 5.9 MEDIUM
Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
CVE-2021-3285 1 Ti 1 Code Composer Studio Intgrated Development Environment 2021-02-03 4.3 MEDIUM 5.3 MEDIUM
jxbrowser in TI Code Composer Studio IDE 8.x through 10.x before 10.1.1 does not verify X.509 certificates for HTTPS.