Vulnerability Analysis for Mail Protocols