Mdaemon v6.0.7 and below remote denial of service exploit which takes advantage of the UIDL bug. Exploit code tested to run on Redhat8 and FreeBSD 4.7-STABLE. Requires POP3 account on vulnerable daemon.
790e1a322fccc231fc267ba7117c1710f124d3cfa7931256bae04b1c005e3278
Scans for rh7 boxes running ssh-2.1.1 that can be exploited using the TESO sshd exploit.
337efffdc164fbd36652c6593639bccf08d6e9a4cece4b53782e75423ac0d2ef