Vulnerabilities > LG
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-09-14 | CVE-2018-16706 | Forced Browsing vulnerability in LG Supersign CMS LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080. | 7.5 |
2018-09-14 | CVE-2018-16288 | Information Exposure vulnerability in LG Supersign CMS 2.5 LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs. | 8.6 |
2018-09-14 | CVE-2018-16287 | Unrestricted Upload of File with Dangerous Type vulnerability in LG Supersign CMS LG SuperSign CMS allows file upload via signEzUI/playlist/edit/upload/..%2f URIs. | 9.8 |
2018-09-14 | CVE-2018-16286 | Improper Authentication vulnerability in LG Supersign CMS LG SuperSign CMS allows authentication bypass because the CAPTCHA requirement is skipped if a captcha:pass cookie is sent, and because the PIN is limited to four digits. | 9.8 |
2018-09-12 | CVE-2018-16946 | Files or Directories Accessible to External Parties vulnerability in LG products LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access control. | 7.5 |
2018-05-04 | CVE-2018-10229 | Information Exposure vulnerability in multiple products A hardware vulnerability in GPU memory modules allows attackers to accelerate micro-architectural attacks through the use of the JavaScript WebGL API. | 4.8 |
2017-01-13 | CVE-2016-10135 | Information Exposure vulnerability in LG Mobile An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. | 5.5 |