An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-12244.json"