IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
DATE :
2025-02-24T22:17:56
SOURCE :
gbhackers.com
CVE:
cve-2025-26794