Press "Enter" to skip to content

Perf3ct Security Posts

SLmail 5.5 Buffer Overflow

This post will explain and include steps on how to manually overflow the vulnerable application located here at Exploit DB. In my specific environment, my Windows VM is located at, and my Kali Linux machine is located at I am also using Immunity Debugger located here. In some…