Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

lg

About This Vendor

lg is a technology vendor producing software and infrastructure products. As a software provider, lg's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of lg's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 87 known vulnerabilities from lg. This includes 33 critical-severity issues and 28 high-severity issues that represent significant risk. These vulnerabilities affect 282 distinct products across lg's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2013 through 2024, indicating decades of continuous security attention and research. Organizations deploying lg products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-3666 2013-05-29 2025-04-11 - 7.2 Unknown
CVE-2014-7243 2014-12-05 2025-04-12 - 5.0 Likely
CVE-2014-7252 2014-12-05 2025-04-12 - 4.6 Unknown
CVE-2014-8757 2015-02-17 2025-04-12 - 8.3 Unknown
CVE-2016-10135 2017-01-13 2025-04-20 5.5 4.3 Likely
CVE-2014-0997 2017-09-26 2025-04-20 7.5 5.0 Likely
CVE-2017-15361 2017-10-16 2025-04-20 5.9 4.3 Likely
CVE-2018-10229 2018-05-04 2024-11-21 4.8 5.8 Likely
CVE-2018-14981 2018-08-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14982 2018-08-17 2024-11-21 9.8 7.5 Likely
CVE-2018-15482 2018-08-17 2024-11-21 9.8 7.5 Likely
CVE-2018-16946 2018-09-12 2024-11-21 7.5 5.0 Likely
CVE-2018-16286 2018-09-14 2024-11-21 9.8 5.0 Likely
CVE-2018-16287 2018-09-14 2024-11-21 9.8 7.5 Likely
CVE-2018-16288 2018-09-14 2024-11-21 8.6 7.8 Likely
CVE-2018-16706 2018-09-14 2024-11-21 7.5 7.8 Likely
CVE-2018-17173 2018-09-21 2024-11-21 9.8 7.5 Likely
CVE-2019-8372 2019-02-18 2024-11-21 7.0 6.9 Unknown
CVE-2019-7404 2019-05-13 2024-11-21 7.5 5.0 Likely
CVE-2018-14839 2019-05-14 2025-11-07 9.8 7.5 Likely
CVE-2013-3685 2020-02-12 2024-11-21 7.0 6.9 Unknown
CVE-2020-9759 2020-03-23 2024-11-21 4.6 9.3 Likely
CVE-2019-20769 2020-04-17 2024-11-21 7.8 4.4 Unknown
CVE-2019-20777 2020-04-17 2024-11-21 9.8 7.5 Likely
CVE-2019-20781 2020-04-29 2024-11-21 7.8 4.4 Unknown
CVE-2020-13839 2020-06-05 2024-11-21 9.8 10.0 Likely
CVE-2020-13840 2020-06-05 2024-11-21 9.8 7.5 Likely
CVE-2020-13841 2020-06-05 2024-11-21 9.8 10.0 Likely
CVE-2020-13842 2020-06-05 2024-11-21 7.8 4.6 Unknown
CVE-2020-7807 2020-09-14 2024-11-21 5.6 1.9 Unknown
CVE-2021-26688 2021-02-04 2024-11-21 9.8 7.5 Likely
CVE-2021-38306 2021-08-24 2024-11-21 9.8 10.0 Likely
CVE-2022-23727 2022-01-28 2024-11-21 7.8 4.6 Unknown
CVE-2022-23730 2022-03-11 2024-11-21 9.8 7.5 Likely
CVE-2022-23731 2022-03-11 2024-11-21 7.8 4.6 Unknown
CVE-2022-45422 2022-11-21 2025-04-28 7.8 - -
CVE-2023-4613 2023-09-04 2024-11-21 9.8 - -
CVE-2023-4614 2023-09-04 2024-11-21 9.8 - -
CVE-2023-4615 2023-09-04 2024-11-21 7.5 - -
CVE-2023-4616 2023-09-04 2024-11-21 7.5 - -
CVE-2023-44121 2023-09-27 2024-11-21 5.0 - -
CVE-2023-44122 2023-09-27 2024-11-21 6.1 - -
CVE-2023-44123 2023-09-27 2024-11-21 6.1 - -
CVE-2023-44124 2023-09-27 2024-11-21 6.1 - -
CVE-2023-44125 2023-09-27 2024-11-21 6.1 - -
CVE-2023-44126 2023-09-27 2024-11-21 3.6 - -
CVE-2023-44127 2023-09-27 2024-11-21 3.6 - -
CVE-2023-44128 2023-09-27 2024-11-21 5.0 - -
CVE-2023-44129 2023-09-27 2024-11-21 3.6 - -
CVE-2024-1885 2024-02-26 2025-03-03 6.3 - -
CVE-2024-1886 2024-02-26 2025-03-03 3.0 - -
CVE-2024-2862 2024-03-25 2025-04-01 9.1 - -
CVE-2024-2863 2024-03-25 2025-04-04 5.3 - -
CVE-2023-6317 2024-04-09 2025-02-07 7.2 - -
CVE-2023-6318 2024-04-09 2025-02-07 9.1 - -
CVE-2023-6319 2024-04-09 2025-02-07 9.1 - -
CVE-2023-6320 2024-04-09 2025-02-07 9.1 - -
CVE-2023-40492 2024-05-03 2025-04-23 9.1 - -
CVE-2023-40493 2024-05-03 2025-04-04 9.8 - -
CVE-2023-40494 2024-05-03 2025-04-04 9.1 - -
CVE-2023-40495 2024-05-03 2025-04-04 7.5 - -
CVE-2023-40496 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40497 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40498 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40499 2024-05-03 2025-04-10 9.1 - -
CVE-2023-40500 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40501 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40502 2024-05-03 2025-04-10 9.1 - -
CVE-2023-40503 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40504 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40505 2024-05-03 2025-04-10 9.8 - -
CVE-2023-40506 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40507 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40508 2024-05-03 2025-04-10 9.1 - -
CVE-2023-40509 2024-05-03 2025-04-10 9.1 - -
CVE-2023-40510 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40511 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40512 2024-05-03 2025-04-10 6.5 - -
CVE-2023-40513 2024-05-03 2025-04-10 6.5 - -
CVE-2023-40514 2024-05-03 2025-04-10 6.5 - -
CVE-2023-40515 2024-05-03 2025-04-10 7.5 - -
CVE-2023-40516 2024-05-03 2025-04-10 7.8 - -
CVE-2023-40517 2024-05-03 2025-08-12 7.5 - -
CVE-2023-41181 2024-05-03 2025-08-12 5.3 - -
CVE-2024-6177 2024-06-20 2024-11-21 6.1 - -
CVE-2024-6178 2024-06-20 2024-11-21 6.1 - -
CVE-2024-6179 2024-06-20 2024-11-21 6.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for lg by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with lg's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.