The document describes vulnerabilities in SSL certificate validation in non-browser software. The authors found that SSL certificate validation is completely broken in many security-critical applications and libraries. A man-in-the-middle attacker can exploit these vulnerabilities to impersonate servers and intercept encrypted communications, even when certificates are signed by legitimate certificate authorities. The root causes are poorly designed SSL library APIs that expose low-level details and lead developers to misimplement certificate validation, along with a lack of proper security testing. This validates SSL connections against the intended threat model.