Show filters
265 Total Results
Displaying 31-40 of 265
Sort by:
Attacker Value
Unknown

CVE-2021-20435

Disclosure Date: September 22, 2021 (last updated February 23, 2025)
IBM Security Verify Bridge 1.0.5.0 does not properly validate a certificate which could allow a local attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 196355.
Attacker Value
Unknown

CVE-2021-38864

Disclosure Date: September 22, 2021 (last updated February 23, 2025)
IBM Security Verify Bridge 1.0.5.0 could allow a user to obtain sensitive information due to improper certificate validation. IBM X-Force ID: 208155.
Attacker Value
Unknown

CVE-2021-33695

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
Attacker Value
Unknown

CVE-2021-40713

Disclosure Date: September 14, 2021 (last updated February 23, 2025)
Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper certificate validation vulnerability in the cold storage component. If an attacker can achieve a man in the middle when the cold server establishes a new certificate, they would be able to harvest sensitive information.
0
Attacker Value
Unknown

CVE-2021-1837

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A certificate validation issue was addressed. This issue is fixed in iOS 14.5 and iPadOS 14.5. An attacker in a privileged network position may be able to alter network traffic.
Attacker Value
Unknown

CVE-2021-37218

Disclosure Date: September 07, 2021 (last updated February 23, 2025)
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
Attacker Value
Unknown

CVE-2021-37219

Disclosure Date: September 07, 2021 (last updated February 23, 2025)
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
Attacker Value
Unknown

CVE-2021-27018

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
The mechanism which performs certificate validation was discovered to have a flaw that resulted in certificates signed by an internal certificate authority to not be properly validated. This issue only affects clients that are configured to utilize Tenable.sc as the vulnerability data source.
Attacker Value
Unknown

CVE-2020-36477

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
An issue was discovered in Mbed TLS before 2.24.0. The verification of X.509 certificates when matching the expected common name (the cn argument of mbedtls_x509_crt_verify) with the actual certificate name is mishandled: when the subjecAltName extension is present, the expected name is compared to any name in that extension regardless of its type. This means that an attacker could impersonate a 4-byte or 16-byte domain by getting a certificate for the corresponding IPv4 or IPv6 address (this would require the attacker to control that IP address, though).
Attacker Value
Unknown

CVE-2020-36478

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.