{"id":"CVE-2014-0350","details":"The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.","modified":"2026-01-27T04:12:28.298455Z","published":"2014-04-26T01:55:04Z","withdrawn":"2026-01-27T04:12:28.298455Z","references":[{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177471.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177573.html"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/118748"},{"type":"WEB","url":"https://raw.githubusercontent.com/pocoproject/poco/poco-1.4.6p4-release/CHANGELOG"}],"schema_version":"1.7.3"}