MailMax versions 4.6 and below POP3 USER remote buffer overflow exploit.
14b8a1f5446fbce8f0033455b422da494838ebd8f710bfefe2e225cd86bde3c9
Mailmax Version 5 has a buffer overflow condition in its IMAP4 server that can cause the service to stop responding and allows a remote attacker to overwrite the exception handler on the stack. Doing this could allow arbitrary code execution as the SYSTEM user.
77a4c3f55a95ea74b2243674c8580202f49806febff62a751e26591ada15dac5
MailMax Standard/Professional popmax v4.8.2.5 and below remote exploit. Sends a long USER string to the pop3 daemon. Tested against Windows 2000 Professional/Server and Windows XP Professional. Patch available here.
6463001871555a4dde5d4631306b9a8eea057ffea8d2462e5fd5a2f22fe762f5
MailMax Standard/Professional popmax v4.8.2.5 patch which fixes a buffer overflow in the USER string.
90cf9e79ea1e5a2cc7a7588d1ce8f11fcc5d80d7fa81284eee2789230e15d36b
Mail-Max SMTP server for windows 95/98/NT contains remote buffer overflows that can result in root compromise. Exploit code (compiles on Linux x86) included.
bd9e54b5e723020155b6c4d447526db08e8a38f0decba193319f9e366086f768