Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2022-3347

Disclosure Date: December 28, 2022 (last updated February 24, 2025)
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.
Attacker Value
Unknown

CVE-2022-3346

Disclosure Date: December 28, 2022 (last updated February 24, 2025)
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.
Attacker Value
Unknown

CVE-2021-23406

Disclosure Date: August 24, 2021 (last updated November 28, 2024)
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
Attacker Value
Unknown

downgrade of effective Strict Transport Security (STS) policy in postfix-mta-st…

Disclosure Date: January 22, 2020 (last updated February 21, 2025)
In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
Attacker Value
Unknown

CVE-2017-11319

Disclosure Date: December 11, 2017 (last updated November 26, 2024)
Perspective ICM Investigation & Case 5.1.1.16 allows remote authenticated users to modify access level permissions and consequently gain privileges by leveraging insufficient validation methods and missing cross server side checking mechanisms.
0