CVE-2022-33271 – Buffer over-read in WLAN
https://notcve.org/view.php?id=CVE-2022-33271
Information disclosure due to buffer over-read in WLAN while parsing NMF frame. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
CVE-2022-33248 – Integer overflow to buffer overflow in User Identity Module
https://notcve.org/view.php?id=CVE-2022-33248
Memory corruption in User Identity Module due to integer overflow to buffer overflow when a segement is received via qmi http. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
CVE-2022-33233 – Configuration weakness in modem
https://notcve.org/view.php?id=CVE-2022-33233
Memory corruption due to configuration weakness in modem wile sending command to write protected files. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-16: Configuration CWE-787: Out-of-bounds Write •
CVE-2022-33232 – Buffer copy without checking size of input in Hypervisor
https://notcve.org/view.php?id=CVE-2022-33232
Memory corruption due to buffer copy without checking size of input while running memory sharing tests with large scattered memory. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-40520 – Stack based buffer overflow in Core
https://notcve.org/view.php?id=CVE-2022-40520
Memory corruption due to stack-based buffer overflow in Core • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-787: Out-of-bounds Write •