Page 17 of 92 results (0.016 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in lg.cgi in Cougar LG 1.9 allows remote attackers to inject arbitrary web script or HTML via the "addr" parameter. Vulnerabilidad de XSS en lg.cgi en Cougar LG 1.9 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrario a través del parámetro "addr". • http://blog.talosintelligence.com/2014/09/looking-glasses-with-bacon.html https://gist.github.com/bittorrent3389/8fee7cdaa73d1d351ee9 https://github.com/Cougar/lg/issues/3 https://hackerone.com/reports/16330 https://tools.cisco.com/security/center/viewAlert.x?alertId=35685 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. The MTKLogger app with a package name of com.mediatek.mtklogger has application components that are accessible to any application that resides on the device. Namely, the com.mediatek.mtklogger.framework.LogReceiver and com.mediatek.mtklogger.framework.MTKLoggerService application components are exported since they contain an intent filter, are not protected by a custom permission, and do not explicitly set the android:exported attribute to false. Therefore, these components are exported by default and are thus accessible to any third party application by using android.content.Intent object for communication. These application components can be used to start and stop the logs using Intent objects with embedded data. • http://www.securityfocus.com/bid/96846 https://lgsecurity.lge.com/security_updates.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.3EPSS: 1%CPEs: 1EXPL: 2

LG On-Screen Phone (OSP) before 4.3.010 allows remote attackers to bypass authorization via a crafted request. LG On-Screen Phone (OSP) anterior a 4.3.010 permite a atacantes remotos evadir la autorización a través de una solicitud manipulada. • http://packetstormsecurity.com/files/130286/LG-On-Screen-Phone-Authentication-Bypass.html http://seclists.org/fulldisclosure/2015/Feb/26 http://www.securityfocus.com/archive/1/534643/100/0/threaded http://www.securityfocus.com/bid/72535 http://www.securityfocus.com/bid/72544 https://exchange.xforce.ibmcloud.com/vulnerabilities/100733 • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 5%CPEs: 8EXPL: 4

WiFiMonitor in Android 4.4.4 as used in the Nexus 5 and 4, Android 4.2.2 as used in the LG D806, Android 4.2.2 as used in the Samsung SM-T310, Android 4.1.2 as used in the Motorola RAZR HD, and potentially other unspecified Android releases before 5.0.1 and 5.0.2 does not properly handle exceptions, which allows remote attackers to cause a denial of service (reboot) via a crafted 802.11 probe response frame. WiFiMonitor en Android 4.4.4 tal y como se emplea en Nexus 5 y 4, Android 4.2.2 tal y como se emplea en LG D806, Android 4.2.2 tal y como se emplea en Samsung SM-T310, Android 4.1.2 tal y como se emplea en Motorola RAZR HD y potencialmente en otras distribuciones Android anteriores a la 5.0.1 y 5.0.2 no gestiona correctamente las excepciones. Esto permite que los atacantes remotos provoquen una denegación de servicio (reinicio) mediante un marco de respuesta de sonda 802.11. • https://www.exploit-db.com/exploits/35913 http://packetstormsecurity.com/files/130107/Android-WiFi-Direct-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/Jan/104 http://www.securityfocus.com/archive/1/534544/100/0/threaded http://www.securityfocus.com/bid/72311 https://www.coresecurity.com/advisories/android-wifi-direct-denial-service • CWE-19: Data Processing Errors •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

Multiple unspecified vulnerabilities in the Syslink driver for Texas Instruments OMAP mobile processor, as used on NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, and PRADA phone by LG L-02D; and SoftBank SHARP handsets 102SH allow local users to execute arbitrary code or read kernel memory via unknown vectors related to userland data and "improper data validation." Múltiples vulnerabilidades no especificadas en el controlador Syslink para el procesador móvil de Texas Instruments OMAP, utilizado en NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, y PRADA phone por LG L-02D; y los teléfonos SoftBank SHARP 102SH permiten a usuarios locales ejecutar código arbitrario o leer la memoria del kernel a través de vectores desconocidos relacionados con los datos userland y 'la validación de datos incorrecta.' • http://jvn.jp/en/jp/JVN67792023/397327/index.html http://jvn.jp/en/jp/JVN67792023/995312/index.html http://jvn.jp/en/jp/JVN67792023/index.html http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html •