Safety vulnerability ID: 42264
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
Latest version: 1.3.0
Daemon which provides TLS client policy for Postfix via socketmap, according to domain MTA-STS policy
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application