Hello Andrew,

Thank you for your response. For example, Exim implements reverse lookup.
How is malicious activity used against it? Do they need telnet or ssh
access,
or buy some freak of nature can exploit the vulnerability in other ways?

N
​

Reply via email to