CWE-297

Improper Validation of Certificate with Host Mismatch

13 CVEs Avg CVSS 6.7 MITRE
2
CRITICAL
4
HIGH
7
MEDIUM
0
LOW
2
POC
0
KEV

Monthly

CVE-2026-34477 MEDIUM PATCH This Month

Man-in-the-middle attacks are possible in Apache Log4j Core through 2.25.3 when SMTP, Socket, or Syslog appenders use TLS with the verifyHostName attribute configured in the <Ssl> element, because the attribute was silently ignored despite being available since version 2.12.0. This is a regression from an incomplete fix to CVE-2025-68161 that only addressed hostname verification via system property. An attacker with a certificate from a trusted CA can intercept TLS connections. Apache has released patched version 2.25.4 to correct this issue.

Apache Java Information Disclosure Apache Log4J Core
NVD GitHub
CVSS 4.0
6.3
EPSS
0.1%
CVE-2025-59060 MEDIUM PATCH This Month

Hostname verification bypass issue in Apache Ranger NiFiRegistryClient/NiFiClient is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue. [CVSS 5.3 MEDIUM]

Apache Ranger
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-26214 HIGH This Week

Galaxy FDS Android SDK version 3.0.8 and earlier disable TLS hostname verification by default, allowing attackers to perform man-in-the-middle attacks against applications using the library. All applications leveraging this SDK with default configuration are vulnerable to interception and modification of communications with Xiaomi FDS cloud storage, potentially compromising authentication credentials and file contents. No patch is currently available, and the affected open source project has reached end-of-life status.

Android Apache Tls
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-15079 MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-68637 CRITICAL Act Now

Uniffle HTTP client (before 0.10.0) trusts all SSL certificates and disables hostname verification by default, exposing all REST API communication between the CLI and Coordinator to man-in-the-middle attacks.

Tls Uniffle
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-46408 CRITICAL POC Act Now

An issue was discovered in the methods push.lite.avtech.com.AvtechLib.GetHttpsResponse and push.lite.avtech.com.Push_HttpService.getNewHttpClient in AVTECH EagleEyes 2.0.0. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Eagleeyes Lite
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2024-12925 HIGH This Month

Improper Validation of Certificate with Host Mismatch vulnerability in Akınsoft QR Menü allows HTTP Response Splitting.05.05 before v1.05.12. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-49015 MEDIUM PATCH This Month

CVE-2025-49015 is a security vulnerability (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian .Net Sdk
NVD GitHub
CVSS 3.1
4.9
EPSS
0.1%
CVE-2024-54019 MEDIUM This Month

A security vulnerability in Fortinet FortiClientWindows (CVSS 4.8) that allows an unauthorized attacker. Remediation should follow standard vulnerability management procedures.

Fortinet Authentication Bypass Forticlient Windows
NVD
CVSS 3.1
4.8
EPSS
0.0%
CVE-2025-3501 HIGH PATCH This Week

A flaw was found in Keycloak. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Redhat
NVD GitHub
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-34477
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Man-in-the-middle attacks are possible in Apache Log4j Core through 2.25.3 when SMTP, Socket, or Syslog appenders use TLS with the verifyHostName attribute configured in the <Ssl> element, because the attribute was silently ignored despite being available since version 2.12.0. This is a regression from an incomplete fix to CVE-2025-68161 that only addressed hostname verification via system property. An attacker with a certificate from a trusted CA can intercept TLS connections. Apache has released patched version 2.25.4 to correct this issue.

Apache Java Information Disclosure +1
NVD GitHub
CVE-2025-59060
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Hostname verification bypass issue in Apache Ranger NiFiRegistryClient/NiFiClient is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue. [CVSS 5.3 MEDIUM]

Apache Ranger
NVD
CVE-2026-26214
EPSS 0% CVSS 7.4
HIGH This Week

Galaxy FDS Android SDK version 3.0.8 and earlier disable TLS hostname verification by default, allowing attackers to perform man-in-the-middle attacks against applications using the library. All applications leveraging this SDK with default configuration are vulnerable to interception and modification of communications with Xiaomi FDS cloud storage, potentially compromising authentication credentials and file contents. No patch is currently available, and the affected open source project has reached end-of-life status.

Android Apache Tls
NVD GitHub
CVE-2025-15079
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl +1
NVD
CVE-2025-68637
EPSS 0% CVSS 9.1
CRITICAL Act Now

Uniffle HTTP client (before 0.10.0) trusts all SSL certificates and disables hostname verification by default, exposing all REST API communication between the CLI and Coordinator to man-in-the-middle attacks.

Tls Uniffle
NVD
CVE-2025-46408
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

An issue was discovered in the methods push.lite.avtech.com.AvtechLib.GetHttpsResponse and push.lite.avtech.com.Push_HttpService.getNewHttpClient in AVTECH EagleEyes 2.0.0. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Eagleeyes Lite
NVD GitHub
CVE-2024-12925
EPSS 0% CVSS 7.3
HIGH This Month

Improper Validation of Certificate with Host Mismatch vulnerability in Akınsoft QR Menü allows HTTP Response Splitting.05.05 before v1.05.12. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49015
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

CVE-2025-49015 is a security vulnerability (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian .Net Sdk
NVD GitHub
CVE-2024-54019
EPSS 0% CVSS 4.8
MEDIUM This Month

A security vulnerability in Fortinet FortiClientWindows (CVSS 4.8) that allows an unauthorized attacker. Remediation should follow standard vulnerability management procedures.

Fortinet Authentication Bypass Forticlient +1
NVD
CVE-2025-3501
EPSS 0% CVSS 8.2
HIGH PATCH This Week

A flaw was found in Keycloak. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Redhat
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy