CWE-297: CWE-297
Yearly Trend
Top Affected Vendors
All CWE-297 CVEs (17)
This vulnerability in AVTECH EagleEyes 2.0.0 disables HTTPS hostname verification, allowing man-in-the-middle attacks. Attackers can intercept and man...
Sep 15, 2025This vulnerability allows attackers to perform Man-in-the-Middle attacks on all REST API communications between Uniffle CLI/client and Coordinator ser...
Jan 7, 2026CVE-2021-33695 is a certificate validation vulnerability in SAP Cloud Connector that allows attackers to intercept and potentially manipulate communic...
Sep 15, 2021This vulnerability in Keycloak allows attackers to bypass certificate verification by setting a verification policy to 'ALL', which unintentionally sk...
Apr 29, 2025This vulnerability allows man-in-the-middle attackers to intercept and tamper with connections to Fortinet's ZTNA proxy by exploiting improper certifi...
Oct 14, 2025This vulnerability in Bouncy Castle's TLS implementation allows DNS poisoning attacks to bypass hostname verification when SSL sockets are created wit...
May 3, 2024This vulnerability in the Galaxy FDS Android SDK disables TLS hostname verification, allowing man-in-the-middle attackers to intercept and modify comm...
Feb 12, 2026A certificate validation flaw in rsync allows man-in-the-middle attacks when using rsync over SSL/TLS. Attackers can intercept and modify data transfe...
May 27, 2021This vulnerability in Akınsoft QR Menü allows attackers to perform HTTP response splitting attacks by exploiting improper certificate validation wit...
Sep 1, 2025This vulnerability allows attackers to bypass TLS host name validation when OpenEdge default certificates are used for network connections, enabling m...
Sep 3, 2024This vulnerability in IBM OpenPages with Watson allows attackers to spoof mail server identity when SSL/TLS security is used. Attackers could intercep...
Feb 20, 2025CVE-2024-8285 is a TLS hostname verification bypass vulnerability in Kroxylicious that allows man-in-the-middle attackers to intercept and manipulate ...
Aug 30, 2024This vulnerability in libcurl allows SSH-based transfers (SCP/SFTP) to accept connections to hosts not listed in the specified known_hosts file if tho...
Jan 8, 2026The Couchbase .NET SDK before version 3.7.1 has a TLS certificate validation vulnerability where hostname verification is disabled by default. This al...
Jun 18, 2025This vulnerability in Apache Log4j Core allows man-in-the-middle attackers to intercept or redirect encrypted log traffic when TLS hostname verificati...
Dec 18, 2025This vulnerability in Fortinet FortiClient for Windows allows attackers to redirect VPN connections through DNS spoofing or other redirection methods ...
Jun 10, 2025The JetBrains Toolbox App before version 2.6 had missing SSH host key verification in its SSH plugin, allowing potential man-in-the-middle attacks. Th...
Apr 17, 2025About CWE-297 (CWE-297)
Our database tracks 17 CVEs classified as CWE-297, with 3 rated critical and 7 rated high severity. The average CVSS score for CWE-297 vulnerabilities is 6.9.
External reference: View CWE-297 on MITRE CWE →
Monitor CWE-297 Vulnerabilities
Get alerted when new CWE-297 CVEs affect your infrastructure.
Start Monitoring Free