An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
{ "versions": [ { "introduced": "0" }, { "fixed": "23.2.2" } ] }
[ { "events": [ { "introduced": "0" }, { "last_affected": "33" } ] } ]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35733.json"