CVE-2009-0569
13.02.2009, 01:30
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.Enginsight
Vendor | Product | Version |
---|---|---|
rimarts | becky\!_internet_mail | 𝑥 ≤ 2.48.02 |
rimarts | becky\!_internet_mail | 1.26.3 |
rimarts | becky\!_internet_mail | 1.26.4 |
rimarts | becky\!_internet_mail | 1.26.5 |
rimarts | becky\!_internet_mail | 2.00.0 |
rimarts | becky\!_internet_mail | 2.00.01 |
rimarts | becky\!_internet_mail | 2.00.02 |
rimarts | becky\!_internet_mail | 2.00.03 |
rimarts | becky\!_internet_mail | 2.0.3 |
rimarts | becky\!_internet_mail | 2.00.04 |
rimarts | becky\!_internet_mail | 2.0.5 |
rimarts | becky\!_internet_mail | 2.00.05 |
rimarts | becky\!_internet_mail | 2.00.06 |
rimarts | becky\!_internet_mail | 2.00.07 |
rimarts | becky\!_internet_mail | 2.00.08 |
rimarts | becky\!_internet_mail | 2.00.09 |
rimarts | becky\!_internet_mail | 2.00.10 |
rimarts | becky\!_internet_mail | 2.00.11 |
rimarts | becky\!_internet_mail | 2.05.00 |
rimarts | becky\!_internet_mail | 2.05.01 |
rimarts | becky\!_internet_mail | 2.05.02 |
rimarts | becky\!_internet_mail | 2.05.03 |
rimarts | becky\!_internet_mail | 2.05.04 |
rimarts | becky\!_internet_mail | 2.05.05 |
rimarts | becky\!_internet_mail | 2.05.06 |
rimarts | becky\!_internet_mail | 2.05.07 |
rimarts | becky\!_internet_mail | 2.05.08 |
rimarts | becky\!_internet_mail | 2.05.09 |
rimarts | becky\!_internet_mail | 2.05.10 |
rimarts | becky\!_internet_mail | 2.05.11 |
rimarts | becky\!_internet_mail | 2.06 |
rimarts | becky\!_internet_mail | 2.06.02 |
rimarts | becky\!_internet_mail | 2.07 |
rimarts | becky\!_internet_mail | 2.07.01 |
rimarts | becky\!_internet_mail | 2.07.02 |
rimarts | becky\!_internet_mail | 2.07.03 |
rimarts | becky\!_internet_mail | 2.07.04 |
rimarts | becky\!_internet_mail | 2.08 |
rimarts | becky\!_internet_mail | 2.08.01 |
rimarts | becky\!_internet_mail | 2.09 |
rimarts | becky\!_internet_mail | 2.09.01 |
rimarts | becky\!_internet_mail | 2.10 |
rimarts | becky\!_internet_mail | 2.10.01 |
rimarts | becky\!_internet_mail | 2.10.02 |
rimarts | becky\!_internet_mail | 2.10.03 |
rimarts | becky\!_internet_mail | 2.10.04 |
rimarts | becky\!_internet_mail | 2.11 |
rimarts | becky\!_internet_mail | 2.11.01 |
rimarts | becky\!_internet_mail | 2.11.02 |
rimarts | becky\!_internet_mail | 2.12 |
rimarts | becky\!_internet_mail | 2.12.01 |
rimarts | becky\!_internet_mail | 2.20 |
rimarts | becky\!_internet_mail | 2.20.01 |
rimarts | becky\!_internet_mail | 2.20.02 |
rimarts | becky\!_internet_mail | 2.20.03 |
rimarts | becky\!_internet_mail | 2.20.04 |
rimarts | becky\!_internet_mail | 2.20.05 |
rimarts | becky\!_internet_mail | 2.20.06 |
rimarts | becky\!_internet_mail | 2.20.07 |
rimarts | becky\!_internet_mail | 2.21 |
rimarts | becky\!_internet_mail | 2.21.01 |
rimarts | becky\!_internet_mail | 2.21.02 |
rimarts | becky\!_internet_mail | 2.21.03 |
rimarts | becky\!_internet_mail | 2.21.04 |
rimarts | becky\!_internet_mail | 2.22 |
rimarts | becky\!_internet_mail | 2.22.01 |
rimarts | becky\!_internet_mail | 2.22.02 |
rimarts | becky\!_internet_mail | 2.23 |
rimarts | becky\!_internet_mail | 2.24 |
rimarts | becky\!_internet_mail | 2.24.01 |
rimarts | becky\!_internet_mail | 2.24.02 |
rimarts | becky\!_internet_mail | 2.25 |
rimarts | becky\!_internet_mail | 2.25.01 |
rimarts | becky\!_internet_mail | 2.25.02 |
rimarts | becky\!_internet_mail | 2.26 |
rimarts | becky\!_internet_mail | 2.27 |
rimarts | becky\!_internet_mail | 2.28 |
rimarts | becky\!_internet_mail | 2.28.01 |
rimarts | becky\!_internet_mail | 2.29 |
rimarts | becky\!_internet_mail | 2.30 |
rimarts | becky\!_internet_mail | 2.30.01 |
rimarts | becky\!_internet_mail | 2.30.02 |
rimarts | becky\!_internet_mail | 2.30.03 |
rimarts | becky\!_internet_mail | 2.30.04 |
rimarts | becky\!_internet_mail | 2.31.00 |
rimarts | becky\!_internet_mail | 2.40.00 |
rimarts | becky\!_internet_mail | 2.40.01 |
rimarts | becky\!_internet_mail | 2.40.02 |
rimarts | becky\!_internet_mail | 2.40.03 |
rimarts | becky\!_internet_mail | 2.40.04 |
rimarts | becky\!_internet_mail | 2.41.00 |
rimarts | becky\!_internet_mail | 2.42.00 |
rimarts | becky\!_internet_mail | 2.43.00 |
rimarts | becky\!_internet_mail | 2.44.00 |
rimarts | becky\!_internet_mail | 2.45.00 |
rimarts | becky\!_internet_mail | 2.45.01 |
rimarts | becky\!_internet_mail | 2.45.02 |
rimarts | becky\!_internet_mail | 2.46 |
rimarts | becky\!_internet_mail | 2.47 |
rimarts | becky\!_internet_mail | 2.47.01 |
rimarts | becky\!_internet_mail | 2.48 |
rimarts | becky\!_internet_mail | 2.48.01 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References