Wietse Venema

Short Name: [None Entered]
Previous Names: [None Entered]
URL: [None Entered]
Email: [None Entered]
Security URL: [None Entered]
Security Email: [None Entered]
Knowledge Base: [None Entered]
Notes: [No Notes]

Vulnerabilities by Vendor Product

Wietse Venema

Wietse Venema
rpcbind Watch-list
2.1
OSVDB ID: 5852 Multiple Unix rpcbind Spoofed Source IP Address Remote DoS
2.1
OSVDB ID: 85839 Wietse Venema rpcbind Replacement pmap_set/pmap_unset UDP Spoofing Remote Privilege Escalation
TCP Wrappers Watch-list
7.6
OSVDB ID: 53019 TCP Wrappers on ftp.win.tue.nl Trojaned Distribution
Postfix Watch-list
1.1.0
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.1
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.10
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.11
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.2
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.3
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.4
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.5
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.6
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.7
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.8
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
1.1.9
OSVDB ID: 6551 Postfix Bounce Scan / Packet Amplification DDoS
2.1.3
OSVDB ID: 13470 Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
2.2
OSVDB ID: 71021 Postfix STARTTLS Arbitrary Plaintext Command Injection
2.4.15
OSVDB ID: 71021 Postfix STARTTLS Arbitrary Plaintext Command Injection
2.5.11
OSVDB ID: 71021 Postfix STARTTLS Arbitrary Plaintext Command Injection
2.6.8
OSVDB ID: 71021 Postfix STARTTLS Arbitrary Plaintext Command Injection
2.7.2
OSVDB ID: 71021 Postfix STARTTLS Arbitrary Plaintext Command Injection
2.5.12
OSVDB ID: 72259 Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
2.6.9
OSVDB ID: 72259 Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
2.7.3
OSVDB ID: 72259 Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
2.8.2
OSVDB ID: 72259 Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption



The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
Privacy Statement - Terms of Use