Vulnerabilities (CVE)

Filtered by vendor Lg Subscribe
Total 49 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-20769 1 Lg 2 G3, Pc Suite 2023-12-10 4.4 MEDIUM 7.8 HIGH
An issue was discovered in LG PC Suite for LG G3 and earlier (aka LG PC Suite v5.3.27 and earlier). DLL Hijacking can occur via a Trojan horse DLL in the current working directory. The LG ID is LVE-MOT-190001 (November 2019).
CVE-2020-13840 2 Google, Lg 35 Android, Cv1, Cv1s and 32 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
CVE-2020-13839 2 Google, Lg 35 Android, Cv1, Cv1s and 32 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
CVE-2020-13841 2 Google, Lg 35 Android, Cv1, Cv1s and 32 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).
CVE-2020-9759 1 Lg 1 Webos 2023-12-10 9.3 HIGH 7.8 HIGH
A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files.
CVE-2020-7807 2 Lg, Microsoft 5 Ipsfullhd, Lg Ultrawide, Lgpcsuite Setup and 2 more 2023-12-10 1.9 LOW 5.5 MEDIUM
A vulnerability that can hijack a DLL file that is loaded during products(LGPCSuite_Setup, IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) installation into a DLL file that the hacker wants. Missing Support for Integrity Check vulnerability in ____COMPONENT____ of LG Electronics (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: LG Electronics; LGPCSuite_Setup : 1.0.0.3 on Windows(x86, x64); IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup : 1.0.0.9 on Windows(x86, x64).
CVE-2019-20777 2 Google, Lg 3 Android, G7, V40 2023-12-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, 8.1, and 9.0 software. WapService mishandles OTA Provisioning on V40 and G7 devices. The LG ID is LVE-SMP-190006 (July 2019).
CVE-2020-13842 2 Google, Lg 35 Android, Cv1, Cv1s and 32 more 2023-12-10 4.6 MEDIUM 7.8 HIGH
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
CVE-2013-3685 2 Lg, Spritesoftware 45 E971, E973, E975 and 42 more 2023-12-10 6.9 MEDIUM 7.0 HIGH
A Privilege Escalation Vulnerability exists in Sprite Software Spritebud 1.3.24 and 1.3.28 and Backup 2.5.4105 and 2.5.4108 on LG Android smartphones due to a race condition in the spritebud daemon, which could let a local malicious user obtain root privileges.
CVE-2018-14839 1 Lg 2 N1a1, N1a1 Firmware 2023-12-10 7.5 HIGH 9.8 CRITICAL
LG N1A1 NAS 3718.510 is affected by: Remote Command Execution. The impact is: execute arbitrary code (remote). The attack vector is: HTTP POST with parameters.
CVE-2019-7404 1 Lg 6 Gamp-7100, Gamp-7100 Firmware, Gapm-7200 and 3 more 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered on LG GAMP-7100, GAPM-7200, and GAPM-8000 routers. An unauthenticated user can read a log file via an HTTP request containing its full pathname, such as http://192.168.0.1/var/gapm7100_${today's_date}.log for reading a filename such as gapm7100_190101.log.
CVE-2018-14981 2 Google, Lg 15 Android, G5, G6 and 12 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for SystemUI application intents. The LG ID is LVE-SMP-180005.
CVE-2018-16288 1 Lg 1 Supersign Cms 2023-12-10 7.8 HIGH 8.6 HIGH
LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs.
CVE-2018-16946 1 Lg 36 Lnb5110, Lnb5110 Firmware, Lnb5320 and 33 more 2023-12-10 5.0 MEDIUM 7.5 HIGH
LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password.
CVE-2018-15482 2 Google, Lg 15 Android, G5, G6 and 12 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for MLT application intents. The LG ID is LVE-SMP-180006.
CVE-2018-16706 1 Lg 1 Supersign Cms 2023-12-10 7.8 HIGH 7.5 HIGH
LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080.
CVE-2018-16286 1 Lg 1 Supersign Cms 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
LG SuperSign CMS allows authentication bypass because the CAPTCHA requirement is skipped if a captcha:pass cookie is sent, and because the PIN is limited to four digits.
CVE-2018-16287 1 Lg 1 Supersign Cms 2023-12-10 7.5 HIGH 9.8 CRITICAL
LG SuperSign CMS allows file upload via signEzUI/playlist/edit/upload/..%2f URIs.
CVE-2018-14982 2 Google, Lg 15 Android, G5, G6 and 12 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
Certain LG devices based on Android 6.0 through 8.1 have incorrect access control in the GNSS application. The LG ID is LVE-SMP-180004.
CVE-2018-17173 1 Lg 1 Supersign Cms 2023-12-10 7.5 HIGH 9.8 CRITICAL
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.