Platform Cts vulnerabilities
4 known vulnerabilities affecting platform/cts.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
UNKNOWN4
Vulnerabilities
Page 1 of 1
CVE-2025-48622UNKNOWN≥ 15:0, < 15:2025-12-01≥ 16:0, < 16:2025-12-01+2 more2025-12-01
CVE-2025-48622 CVE-2025-48622: In ProcessArea of dng_misc_opcodes
In ProcessArea of dng_misc_opcodes.cpp, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2023-40093UNKNOWN≥ 14-next:0, < 14-next:2024-02-01≥ 11:0, < 11:2024-02-01+4 more2024-02-01
CVE-2023-40093 CVE-2023-40093: In multiple files, there is a possible way that trimmed content could be included in PDF output due to a logic error in the code
In multiple files, there is a possible way that trimmed content could be included in PDF output due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2021-0307UNKNOWN≥ 10:0, < 10:2021-01-01≥ 11:0, < 11:2021-01-012021-01-01
CVE-2021-0307 CVE-2021-0307: In updatePermissionSourcePackage of PermissionManagerService
In updatePermissionSourcePackage of PermissionManagerService.java, there is a possible automatic runtime permission grant due to a confused deputy. This could lead to local escalation of privilege allowing a malicious app to silently gain access to a dangerous permission with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2020-0227UNKNOWN≥ 8.0:0, < 8.0:2020-07-01≥ 8.1:0, < 8.1:2020-07-01+2 more2020-07-01
CVE-2020-0227 CVE-2020-0227: In onCommand of CompanionDeviceManagerService
In onCommand of CompanionDeviceManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing background data usage or launching from the background, with no additional execution privileges needed. User interaction is not needed for exploitation.
osv