Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
journal vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2016-0038
Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote malicious users to execute arbitrary code via a crafted Journal file, aka "Windows Jour...
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
7.5
CVSSv2
CVE-2013-4391
Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow.
Systemd Project Systemd
Debian Debian Linux 7.0
9.3
CVSSv2
CVE-2014-1824
Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote malicious users to execute arbitrary code via a crafted Journal (aka .JNT) file, a...
Microsoft Windows Rt 8.1 -
Microsoft Windows Rt -
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows 8
3.6
CVSSv2
CVE-2012-5628
gofer prior to 0.68 uses world-writable permissions for /var/lib/gofer/journal/watchdog, which allows local users to cause a denial of service by removing journal entries.
Gofer Project Gofer 0.68
NA
CVE-2024-33953
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt van Andel Adventure Journal allows Stored XSS.This issue affects Adventure Journal: from n/a up to and including 1.7.2.
6.8
CVSSv2
CVE-2017-2807
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability.
Ledger-cli Ledger 3.1.1
5
CVSSv2
CVE-2011-3901
Android SQLite Journal prior to 4.0.1 has an information disclosure vulnerability.
Google Android 2.3.7
2.1
CVSSv2
CVE-2015-8842
tmpfiles.d/systemd.conf in systemd prior to 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
Opensuse Opensuse 13.2
NA
CVE-2023-35870
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a ...
Sap S4core 104
Sap S4core 105
Sap S4core 106
Sap S4core 107
6.8
CVSSv2
CVE-2020-8625
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid...
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.11.5
Isc Bind 9.11.8
Isc Bind 9.11.21
Isc Bind 9.17.0
Isc Bind 9.17.1
Isc Bind 9.16.8
Isc Bind 9.16.11
Isc Bind 9.11.27
Isc Bind
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Siemens Sinec Infrastructure Network Services
Netapp Cloud Backup -
Netapp A250 Firmware -
Netapp 500f Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »