Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0569 (GCVE-0-2009-0569)
Vulnerability from cvelistv5 – Published: 2009-02-13 01:00 – Updated: 2024-08-07 04:40
VLAI?
EPSS
Summary
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.089Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2009-000011",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"name": "becky-readreceipt-bo(48684)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"name": "33892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33892"
},
{
"name": "33756",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/33756"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"name": "JVN#29641290",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-02-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "JVNDB-2009-000011",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"name": "becky-readreceipt-bo(48684)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"name": "33892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33892"
},
{
"name": "33756",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/33756"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"name": "JVN#29641290",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0569",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2009-000011",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"name": "becky-readreceipt-bo(48684)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"name": "33892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33892"
},
{
"name": "33756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33756"
},
{
"name": "http://www.rimarts.jp/downloads/B2/Readme-e.txt",
"refsource": "CONFIRM",
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"name": "JVN#29641290",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0569",
"datePublished": "2009-02-13T01:00:00.000Z",
"dateReserved": "2009-02-12T00:00:00.000Z",
"dateUpdated": "2024-08-07T04:40:05.089Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
JVNDB-2009-000011
Vulnerability from jvndb - Published: 2009-02-12 17:28 - Updated:2009-02-12 17:28Summary
Becky! Internet Mail buffer overflow vulnerability
Details
Becky! Internet Mail contains a buffer overflow vulnerability.
Becky! Internet Mail is an email client software. Becky! Internet Mail contains a buffer overflow vulnerability as it does not properly handle read receipt requests.
Yuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000011.html",
"dc:date": "2009-02-12T17:28+09:00",
"dcterms:issued": "2009-02-12T17:28+09:00",
"dcterms:modified": "2009-02-12T17:28+09:00",
"description": "Becky! Internet Mail contains a buffer overflow vulnerability. \r\n\r\nBecky! Internet Mail is an email client software. Becky! Internet Mail contains a buffer overflow vulnerability as it does not properly handle read receipt requests.\r\n\r\nYuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000011.html",
"sec:cpe": {
"#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
"@product": "Becky! Internet Mail",
"@vendor": "RIMARTS",
"@version": "2.2"
},
"sec:cvss": {
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2009-000011",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN29641290/index.html",
"@id": "JVN#29641290",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0569",
"@id": "CVE-2009-0569",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0569",
"@id": "CVE-2009-0569",
"@source": "NVD"
},
{
"#text": "http://www.ipa.go.jp/security/english/vuln/200902_becky_en.html",
"@id": "Security Alert for Becky! Internet Mail Vulnerability",
"@source": "IPA SECURITY ALERTS"
},
{
"#text": "http://secunia.com/advisories/33892",
"@id": "SA33892",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/33756",
"@id": "33756",
"@source": "BID"
},
{
"#text": "http://xforce.iss.net/xforce/xfdb/48684",
"@id": "48684",
"@source": "XF"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html",
"@id": "JVNDB-2009-000011",
"@source": "JVNDB_Ja"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-119",
"@title": "Buffer Errors(CWE-119)"
}
],
"title": "Becky! Internet Mail buffer overflow vulnerability"
}
GSD-2009-0569
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2009-0569",
"description": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.",
"id": "GSD-2009-0569"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0569"
],
"details": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.",
"id": "GSD-2009-0569",
"modified": "2023-12-13T01:19:43.927225Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0569",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2009-000011",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"name": "becky-readreceipt-bo(48684)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"name": "33892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33892"
},
{
"name": "33756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33756"
},
{
"name": "http://www.rimarts.jp/downloads/B2/Readme-e.txt",
"refsource": "CONFIRM",
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"name": "JVN#29641290",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.48.02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.44.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.43.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.31.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.42.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.41.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0569"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#29641290",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
},
{
"name": "JVNDB-2009-000011",
"refsource": "JVNDB",
"tags": [],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"name": "33756",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/33756"
},
{
"name": "33892",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33892"
},
{
"name": "http://www.rimarts.jp/downloads/B2/Readme-e.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"name": "becky-readreceipt-bo(48684)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-08-08T01:33Z",
"publishedDate": "2009-02-13T01:30Z"
}
}
}
GHSA-75WQ-H3MV-PJ8Q
Vulnerability from github – Published: 2022-05-02 03:16 – Updated: 2022-05-02 03:16
VLAI?
Details
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
{
"affected": [],
"aliases": [
"CVE-2009-0569"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-02-13T01:30:00Z",
"severity": "HIGH"
},
"details": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.",
"id": "GHSA-75wq-h3mv-pj8q",
"modified": "2022-05-02T03:16:38Z",
"published": "2022-05-02T03:16:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0569"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33892"
},
{
"type": "WEB",
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/33756"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2009-0569
Vulnerability from fkie_nvd - Published: 2009-02-13 01:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://jvn.jp/en/jp/JVN29641290/index.html | ||
| cve@mitre.org | http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html | ||
| cve@mitre.org | http://secunia.com/advisories/33892 | Vendor Advisory | |
| cve@mitre.org | http://www.rimarts.jp/downloads/B2/Readme-e.txt | ||
| cve@mitre.org | http://www.securityfocus.com/bid/33756 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/48684 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN29641290/index.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33892 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.rimarts.jp/downloads/B2/Readme-e.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33756 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/48684 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rimarts | becky\!_internet_mail | * | |
| rimarts | becky\!_internet_mail | 1.26.3 | |
| rimarts | becky\!_internet_mail | 1.26.4 | |
| rimarts | becky\!_internet_mail | 1.26.5 | |
| rimarts | becky\!_internet_mail | 2.00.0 | |
| rimarts | becky\!_internet_mail | 2.00.01 | |
| rimarts | becky\!_internet_mail | 2.00.02 | |
| rimarts | becky\!_internet_mail | 2.00.03 | |
| rimarts | becky\!_internet_mail | 2.0.3 | |
| rimarts | becky\!_internet_mail | 2.00.04 | |
| rimarts | becky\!_internet_mail | 2.0.5 | |
| rimarts | becky\!_internet_mail | 2.00.05 | |
| rimarts | becky\!_internet_mail | 2.00.06 | |
| rimarts | becky\!_internet_mail | 2.00.07 | |
| rimarts | becky\!_internet_mail | 2.00.08 | |
| rimarts | becky\!_internet_mail | 2.00.09 | |
| rimarts | becky\!_internet_mail | 2.00.10 | |
| rimarts | becky\!_internet_mail | 2.00.11 | |
| rimarts | becky\!_internet_mail | 2.05.00 | |
| rimarts | becky\!_internet_mail | 2.05.01 | |
| rimarts | becky\!_internet_mail | 2.05.02 | |
| rimarts | becky\!_internet_mail | 2.05.03 | |
| rimarts | becky\!_internet_mail | 2.05.04 | |
| rimarts | becky\!_internet_mail | 2.05.05 | |
| rimarts | becky\!_internet_mail | 2.05.06 | |
| rimarts | becky\!_internet_mail | 2.05.07 | |
| rimarts | becky\!_internet_mail | 2.05.08 | |
| rimarts | becky\!_internet_mail | 2.05.09 | |
| rimarts | becky\!_internet_mail | 2.05.10 | |
| rimarts | becky\!_internet_mail | 2.05.11 | |
| rimarts | becky\!_internet_mail | 2.06 | |
| rimarts | becky\!_internet_mail | 2.06.02 | |
| rimarts | becky\!_internet_mail | 2.07 | |
| rimarts | becky\!_internet_mail | 2.07.01 | |
| rimarts | becky\!_internet_mail | 2.07.02 | |
| rimarts | becky\!_internet_mail | 2.07.03 | |
| rimarts | becky\!_internet_mail | 2.07.04 | |
| rimarts | becky\!_internet_mail | 2.08 | |
| rimarts | becky\!_internet_mail | 2.08.01 | |
| rimarts | becky\!_internet_mail | 2.09 | |
| rimarts | becky\!_internet_mail | 2.09.01 | |
| rimarts | becky\!_internet_mail | 2.10 | |
| rimarts | becky\!_internet_mail | 2.10.01 | |
| rimarts | becky\!_internet_mail | 2.10.02 | |
| rimarts | becky\!_internet_mail | 2.10.03 | |
| rimarts | becky\!_internet_mail | 2.10.04 | |
| rimarts | becky\!_internet_mail | 2.11 | |
| rimarts | becky\!_internet_mail | 2.11.01 | |
| rimarts | becky\!_internet_mail | 2.11.02 | |
| rimarts | becky\!_internet_mail | 2.12 | |
| rimarts | becky\!_internet_mail | 2.12.01 | |
| rimarts | becky\!_internet_mail | 2.20 | |
| rimarts | becky\!_internet_mail | 2.20.01 | |
| rimarts | becky\!_internet_mail | 2.20.02 | |
| rimarts | becky\!_internet_mail | 2.20.03 | |
| rimarts | becky\!_internet_mail | 2.20.04 | |
| rimarts | becky\!_internet_mail | 2.20.05 | |
| rimarts | becky\!_internet_mail | 2.20.06 | |
| rimarts | becky\!_internet_mail | 2.20.07 | |
| rimarts | becky\!_internet_mail | 2.21 | |
| rimarts | becky\!_internet_mail | 2.21.01 | |
| rimarts | becky\!_internet_mail | 2.21.02 | |
| rimarts | becky\!_internet_mail | 2.21.03 | |
| rimarts | becky\!_internet_mail | 2.21.04 | |
| rimarts | becky\!_internet_mail | 2.22 | |
| rimarts | becky\!_internet_mail | 2.22.01 | |
| rimarts | becky\!_internet_mail | 2.22.02 | |
| rimarts | becky\!_internet_mail | 2.23 | |
| rimarts | becky\!_internet_mail | 2.24 | |
| rimarts | becky\!_internet_mail | 2.24.01 | |
| rimarts | becky\!_internet_mail | 2.24.02 | |
| rimarts | becky\!_internet_mail | 2.25 | |
| rimarts | becky\!_internet_mail | 2.25.01 | |
| rimarts | becky\!_internet_mail | 2.25.02 | |
| rimarts | becky\!_internet_mail | 2.26 | |
| rimarts | becky\!_internet_mail | 2.27 | |
| rimarts | becky\!_internet_mail | 2.28 | |
| rimarts | becky\!_internet_mail | 2.28.01 | |
| rimarts | becky\!_internet_mail | 2.29 | |
| rimarts | becky\!_internet_mail | 2.30 | |
| rimarts | becky\!_internet_mail | 2.30.01 | |
| rimarts | becky\!_internet_mail | 2.30.02 | |
| rimarts | becky\!_internet_mail | 2.30.03 | |
| rimarts | becky\!_internet_mail | 2.30.04 | |
| rimarts | becky\!_internet_mail | 2.31.00 | |
| rimarts | becky\!_internet_mail | 2.40.00 | |
| rimarts | becky\!_internet_mail | 2.40.01 | |
| rimarts | becky\!_internet_mail | 2.40.02 | |
| rimarts | becky\!_internet_mail | 2.40.03 | |
| rimarts | becky\!_internet_mail | 2.40.04 | |
| rimarts | becky\!_internet_mail | 2.41.00 | |
| rimarts | becky\!_internet_mail | 2.42.00 | |
| rimarts | becky\!_internet_mail | 2.43.00 | |
| rimarts | becky\!_internet_mail | 2.44.00 | |
| rimarts | becky\!_internet_mail | 2.45.00 | |
| rimarts | becky\!_internet_mail | 2.45.01 | |
| rimarts | becky\!_internet_mail | 2.45.02 | |
| rimarts | becky\!_internet_mail | 2.46 | |
| rimarts | becky\!_internet_mail | 2.47 | |
| rimarts | becky\!_internet_mail | 2.47.01 | |
| rimarts | becky\!_internet_mail | 2.48 | |
| rimarts | becky\!_internet_mail | 2.48.01 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35441657-9A1E-4A77-9536-81F367C47DA0",
"versionEndIncluding": "2.48.02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BFDF43FF-5C93-40EA-A5BD-128E1BC7BA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1A62CEDC-A2A6-4FF6-98B4-5DD9D62CE998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.5:*:*:*:*:*:*:*",
"matchCriteriaId": "80DC7CF9-2FB1-4F0F-82C0-A6A7AE375823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BB83AC-D0DD-4482-A1A5-6C86C7B6714D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.01:*:*:*:*:*:*:*",
"matchCriteriaId": "645DB3EB-FE95-4FB3-8763-553ACB7E7F8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB7CEFD-6E32-4335-9121-D406312A9B38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.03:*:*:*:*:*:*:*",
"matchCriteriaId": "7382D4FC-706A-4AE2-A05C-1D0B118EEB1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1880ED-7933-49F8-B343-C1C67B8A8FA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A72B3497-5E28-4AD6-A862-6444DA8D6009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F959DE4F-1340-473D-8D66-D5A5FAE5A149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.05:*:*:*:*:*:*:*",
"matchCriteriaId": "6A822625-04C7-426B-84D9-0980E9FCE3C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.06:*:*:*:*:*:*:*",
"matchCriteriaId": "C638FBED-D830-4DC2-BE43-7CD7FE27BBFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0EF9A6-BB23-4C45-94E1-24B5D4505CA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.08:*:*:*:*:*:*:*",
"matchCriteriaId": "809F7EC5-A7FE-47E2-8681-EF8DF204770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.09:*:*:*:*:*:*:*",
"matchCriteriaId": "4060C6A3-DE96-4EF8-87BB-65B0BE2E87AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.10:*:*:*:*:*:*:*",
"matchCriteriaId": "11A74E8D-8938-4963-A514-928FCF8A06C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.11:*:*:*:*:*:*:*",
"matchCriteriaId": "21896C1E-9F29-4B27-A6E7-ACAFA53694A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.00:*:*:*:*:*:*:*",
"matchCriteriaId": "29AAF319-B2B9-4CEF-ABAE-B8FE51723EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9055C591-40DE-429C-8F53-F1F6A1E421B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D805188D-6F89-4E4F-845E-FFED2D979E50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.03:*:*:*:*:*:*:*",
"matchCriteriaId": "675A7B36-A89F-4FB7-A5A9-16C510BF267D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.04:*:*:*:*:*:*:*",
"matchCriteriaId": "06615A8C-819F-43D8-913C-27B9EAE10F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCFA543-A594-4D80-9EF5-EE4D3B918E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.06:*:*:*:*:*:*:*",
"matchCriteriaId": "D98208DF-E941-4016-A2A3-75EE4B94BF92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.07:*:*:*:*:*:*:*",
"matchCriteriaId": "DA356BFC-31FF-4D69-A945-774E39EAD8FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.08:*:*:*:*:*:*:*",
"matchCriteriaId": "0415269F-2CDB-4E5D-8882-E8E90FCEF207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.09:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2D14C1-C391-4C56-BDAC-09D0ED95F223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BD2D2-2AD7-4401-B7A4-D963408AF286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3D313111-5218-4EE9-8D23-B6C769CB2F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2F96BC-96B9-4996-AA37-724FD9166642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B5476F50-5D15-4DC3-9385-FEA4977A2C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3D8D78-A47E-4E38-A64B-0FBAFBBFEF01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.01:*:*:*:*:*:*:*",
"matchCriteriaId": "4F435683-AD92-4A93-8348-788DCCF3F31D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B063DBDD-6DB1-4997-B026-3296A845A668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.03:*:*:*:*:*:*:*",
"matchCriteriaId": "8184A401-D0F6-46DC-9A90-88F161DC9035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.04:*:*:*:*:*:*:*",
"matchCriteriaId": "00E06240-6F6F-48B3-8BDA-1B472714C851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "D847B935-0A83-4B69-954C-F96AE9561FFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08.01:*:*:*:*:*:*:*",
"matchCriteriaId": "7F777BC3-020F-4FA5-8C5B-AF9A3B97E829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "0802E75B-0AA7-4292-AF8C-B33B0FD370B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1AD4FC-7ABD-49A4-96E4-0EFD05D0BDBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7C0F5B41-293D-4B7F-A0EA-F010DF3F56FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.01:*:*:*:*:*:*:*",
"matchCriteriaId": "49633DD2-0CB2-40F4-B142-40FDB48E75E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.02:*:*:*:*:*:*:*",
"matchCriteriaId": "01852229-2482-4643-ACB0-5FAC5B5EAF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.03:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63EEF-89F4-41AF-973B-2B7C6FB71D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EAAA6ED-F4D1-4D99-A5DA-CCA2CB67E2FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA5444C-0145-4A83-876A-37E078FF3690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.01:*:*:*:*:*:*:*",
"matchCriteriaId": "E053257F-987A-46C7-86EB-5AB7DDF625D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "EC95A4DB-9A6B-4655-B3C2-CFD661D860D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "77A44287-7780-4F7E-A42A-8C84651B8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "A4898613-F821-4775-B6D0-3D6B74498B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "5903530F-DD3A-408F-8849-7B99C62C7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.01:*:*:*:*:*:*:*",
"matchCriteriaId": "01B57218-DD5E-4C71-8FFB-2089C4EE0CFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.02:*:*:*:*:*:*:*",
"matchCriteriaId": "BE465630-5DA4-4060-BFFA-C0041270861F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.03:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD9D9AA-45F7-4D5B-8492-357B7AFA84FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.04:*:*:*:*:*:*:*",
"matchCriteriaId": "C99317BC-2B79-46EA-8CD5-75FA8F4876B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.05:*:*:*:*:*:*:*",
"matchCriteriaId": "E74BB72E-1FD5-4C8F-A444-1FAE385F46DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.06:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC52F17-5084-4B32-801F-89E1D2CA3109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.07:*:*:*:*:*:*:*",
"matchCriteriaId": "114AFAE6-5736-4264-89C6-2DE0B0EBDDB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "19C8F2E3-577C-4A57-B70A-AF3B6F42745E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2A2B9909-67E2-496A-BA72-8A52C9A28CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.02:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBB8734-733D-4B63-9C99-FDBD681CBA94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.03:*:*:*:*:*:*:*",
"matchCriteriaId": "477567A2-3C3F-46A2-865C-36DE7E7B8E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.04:*:*:*:*:*:*:*",
"matchCriteriaId": "08CDB46B-ABC0-4ABA-8D0A-9CFF0139359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4054A3EE-8D3F-47B5-A92C-58D49B7C4DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.01:*:*:*:*:*:*:*",
"matchCriteriaId": "8552BACC-B0D4-4BF2-82EF-241A7A1725CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.02:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D76CB5-C808-40B2-AD9B-4F62412B4EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "23FDEC56-D1A9-46FF-9819-38E1264EC706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "C766094E-99A3-4844-86C0-FE24748FEB2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.01:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9AE3D9-9744-472F-8269-6467A1E51986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.02:*:*:*:*:*:*:*",
"matchCriteriaId": "908A9307-2020-4984-BD90-B202B462B388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "8C613B75-DF83-4E98-9D34-9B0CEE40C5A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.01:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1154A2-F41D-4BDC-9ED8-0FD1FBCBFD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D29E0FBF-F6E1-4352-8EE3-7772AFBC1FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E4175B57-4513-4AFC-9E01-49EB99811188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AE8FC0-BC89-4615-A45B-40697BA82884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "591C04BC-A493-49A5-B50D-0028323F9C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1128DB6B-E007-4EC5-980D-2EB57FFA2207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "AFBC1EAA-D3BB-42C6-A46B-97EAA12035D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "522FBEA4-456D-48B8-8F57-D0E0C7F64A18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.01:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D0B203-4E36-4B44-B3DC-6C8297D5A219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.02:*:*:*:*:*:*:*",
"matchCriteriaId": "23ACE386-34BC-487C-AED2-98205D533466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.03:*:*:*:*:*:*:*",
"matchCriteriaId": "6096EF9A-D8B9-4EA7-A8C0-B31212FD0222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE4A278-AF8B-4838-9B30-B17E61D4C4EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.31.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B050938B-092F-4D65-A0E4-DEC3984D7D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.00:*:*:*:*:*:*:*",
"matchCriteriaId": "F69BD985-3861-4ABB-91EE-F712BF045D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.01:*:*:*:*:*:*:*",
"matchCriteriaId": "A0480A36-1D98-4B84-AED7-0F325CAD9B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.02:*:*:*:*:*:*:*",
"matchCriteriaId": "75438538-6D0A-44C1-B6C5-BF592104B5BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.03:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF4651-3E29-404C-808A-B4446C5F14E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E9811A-E845-4241-A1D4-B0AF5A299DE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.41.00:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1B5D17-0CAC-45DE-BD74-3A34F765A609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.42.00:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3F133A-8118-44F8-A2BA-0CE0437B8460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.43.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D9147D46-80A5-4284-A219-52F59A2B8512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.44.00:*:*:*:*:*:*:*",
"matchCriteriaId": "CF39DB9E-D32D-4905-A135-2D5038007F4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.00:*:*:*:*:*:*:*",
"matchCriteriaId": "C03F7772-3FAC-4C11-8A81-248D0556E7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9D7C828B-625A-4CF5-A3F9-209D7B1DD896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.02:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFD231B-8057-4FA3-BE48-84D6EA8DF72C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.46:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEC070C-B2A4-4D10-90C1-89F8C1576C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D57C3E-F2AF-47C6-836F-19761D55BD68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47.01:*:*:*:*:*:*:*",
"matchCriteriaId": "53F66197-CD50-4794-B200-532C23BC7732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48:*:*:*:*:*:*:*",
"matchCriteriaId": "8B421DA1-3C58-4224-AC1B-685DC0AB1368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.01:*:*:*:*:*:*:*",
"matchCriteriaId": "768CB429-EE2E-4E3C-9051-3C6528A60BE8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Becky!! Internet Mail v2.48.02 y anteriores, que permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de mensajes de correo electr\u00f3nico con una retorno manipulado de recepci\u00f3n de petici\u00f3n."
}
],
"id": "CVE-2009-0569",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-02-13T01:30:00.377",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33892"
},
{
"source": "cve@mitre.org",
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/33756"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN29641290/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33892"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/33756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…