
CVE-2022-40531 – Incorrect type conversion in WLAN
https://notcve.org/view.php?id=CVE-2022-40531
07 Mar 2023 — Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •

CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
07 Mar 2023 — Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-40527 – Reachable Assertion in WLAN Embedded SW
https://notcve.org/view.php?id=CVE-2022-40527
07 Mar 2023 — Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •

CVE-2022-25655 – Buffer copy without checking the size of input in WLAN HAL.
https://notcve.org/view.php?id=CVE-2022-25655
07 Mar 2023 — Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-40512 – Buffer over-read in WLAN Firmware.
https://notcve.org/view.php?id=CVE-2022-40512
09 Feb 2023 — Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2022-33277 – Buffer copy without checking size of input in modem
https://notcve.org/view.php?id=CVE-2022-33277
09 Feb 2023 — Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-33271 – Buffer over-read in WLAN
https://notcve.org/view.php?id=CVE-2022-33271
09 Feb 2023 — Information disclosure due to buffer over-read in WLAN while parsing NMF frame. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2022-40519 – Buffer over-read in Core
https://notcve.org/view.php?id=CVE-2022-40519
06 Jan 2023 — Information disclosure due to buffer overread in Core • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-125: Out-of-bounds Read •

CVE-2022-40517 – Stack based buffer overflow in Core
https://notcve.org/view.php?id=CVE-2022-40517
06 Jan 2023 — Memory corruption in core due to stack-based buffer overflow Corrupción de la memoria en el núcleo debido al desbordamiento de búfer en la región stack de la memoria • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2022-40516 – Stack-based buffer overflow in Core
https://notcve.org/view.php?id=CVE-2022-40516
06 Jan 2023 — Memory corruption in Core due to stack-based buffer overflow. • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •