OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
- https://sourceforge.net/p/opendmarc/tickets/237/
- https://github.com/90skalai/Cyber-Security-project-submission
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2020-12272
- https://github.com/Mr-Anonymous002/espoofer
- https://github.com/Queennorathehacker/espoofer
- https://github.com/SovereignDesigns/science
- https://github.com/Teutades/Espoofer
- https://github.com/anjhz0318/SpamTester
- https://github.com/chenjj/espoofer
- https://github.com/merlinepedra/ESPOOFER
- https://github.com/prajwal0909/es
- https://github.com/prashantvermaofficial/Email-Spoofing-Testing