Researchers found 18 exploits that take advantage of inconsistencies in the email plumbing most people never think about.