Just wanted to note this:
http://secunia.com/advisories/18989/Description:
Nemesis Security Audit Group has discovered a vulnerability in The Bat!, which potentially can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error within the parsing of the email subject header. This can be exploited to cause a unicode stack-based buffer overflow via a specially-crafted email message with an overly long subject.
The vulnerability has been confirmed in version 3.60.07. Other versions may also be affected.
Solution:
Update to version 3.71.03.