1961406 - SSL.com: DCV bypass and issue fake certificates for any MX hostname
CA Certificate Compliance
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36 Edg/135.0.0.0
Steps to reproduce:
SSL.com failed to conduct accurate domain validation control when utilizing the BR 3.2.2.4.14 DCV method (Email to DNS TXT Contact). It incorrectly marks the hostname of the approver's email address as a verified domain, which is completely erroneous.
Steps to reproduce:
Navigate to https://dcv-inspector.com ...
Read more at bugzilla.mozilla.org