The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
https://www.oracle.com/security-alerts/cpujan2020.html
https://issues.apache.org/jira/browse/AXIS-2905
https://exchange.xforce.ibmcloud.com/vulnerabilities/95377
http://www.securitytracker.com/id/1030745
http://www.securityfocus.com/bid/69295
http://www.openwall.com/lists/oss-security/2014/08/20/2
http://secunia.com/advisories/61222
http://rhn.redhat.com/errata/RHSA-2014-1193.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html