IPSwitch IMail Server v7.11 remote system exploit. Overflows the GET parameter in the Web Messaging daemon in all IMail versions to date. There are over 49 million users of IMail worldwide. Patch available here.
35c821776d9bb0af1fc4b049f211ca07fb58ac7eecd2c428058fac0629803de5
IPSwitch IMail Server v7.1 security patch. Fixes overflow described in imailexp.c.
225b746db3f3c62ebeef99e4e58c94b647123eb0232661ac368a904b0241eb3e
MailMax Standard/Professional popmax v4.8.2.5 and below remote exploit. Sends a long USER string to the pop3 daemon. Tested against Windows 2000 Professional/Server and Windows XP Professional. Patch available here.
6463001871555a4dde5d4631306b9a8eea057ffea8d2462e5fd5a2f22fe762f5
MailMax Standard/Professional popmax v4.8.2.5 patch which fixes a buffer overflow in the USER string.
90cf9e79ea1e5a2cc7a7588d1ce8f11fcc5d80d7fa81284eee2789230e15d36b
Mercur mail server v4.2 remote exploit. The Mercur mail server's control service listens to tcp port 32000 and is vulnerable to a buffer overflow in the password field. Tested against Windows 2000 and XP pro. Sends a shell to port 3333.
5d47b93de6b6b5e44524436f14aa61eeae568221c556a2a9290570d4db621bef