This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0). Using the PAYLOAD of windows/shell_bind_tcp allows or the most reliable results.
2e4d189387ba98a5cfc55e1b2069672f8e124842d9a76dd7e47cd00b025cf6ad
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0).
8a121139f249e6548cbc7820b46b86c8b80b4461dc890da11b6984bcb56cc9f0