Show filters
294 Total Results
Displaying 31-40 of 294
Sort by:
Attacker Value
Unknown

CVE-2023-4616

Disclosure Date: September 04, 2023 (last updated February 25, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/thumbnail endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the current user.
Attacker Value
Unknown

CVE-2023-4615

Disclosure Date: September 04, 2023 (last updated February 25, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/download/updateFile endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the current user.
Attacker Value
Unknown

CVE-2023-4614

Disclosure Date: September 04, 2023 (last updated February 25, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/installation/setThumbnailRc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user.
Attacker Value
Unknown

CVE-2023-4613

Disclosure Date: September 04, 2023 (last updated February 25, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/settings/upload endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user.
Attacker Value
Unknown

CVE-2023-41642

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.
Attacker Value
Unknown

CVE-2023-41640

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.
Attacker Value
Unknown

CVE-2023-41638

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file.
Attacker Value
Unknown

CVE-2023-41637

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.
Attacker Value
Unknown

CVE-2023-41636

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
A SQL injection vulnerability in the Data Richiesta dal parameter of GruppoSCAI RealGimm v1.1.37p38 allows attackers to access the database and execute arbitrary commands via a crafted SQL query.
Attacker Value
Unknown

CVE-2023-41635

Disclosure Date: August 31, 2023 (last updated February 25, 2025)
A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.