The software uses an OpenSSL Certificate without validating the certificate data.This could allow an attacker to claim to be a trusted host.