![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
07 Mar 2023 — Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40527 – Reachable Assertion in WLAN Embedded SW
https://notcve.org/view.php?id=CVE-2022-40527
07 Mar 2023 — Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-33309 – Buiffer over-read in WLAN Firmware.
https://notcve.org/view.php?id=CVE-2022-33309
07 Mar 2023 — Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-25655 – Buffer copy without checking the size of input in WLAN HAL.
https://notcve.org/view.php?id=CVE-2022-25655
07 Mar 2023 — Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40514 – Buffer copy without checking size of input in WLAN Firmware
https://notcve.org/view.php?id=CVE-2022-40514
09 Feb 2023 — Memory corruption due to buffer copy without checking the size of input in WLAN Firmware while processing CCKM IE in reassoc response frame. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40513 – Uncontrolled resource consumption in WLAN Firmware.
https://notcve.org/view.php?id=CVE-2022-40513
09 Feb 2023 — Transient DOS due to uncontrolled resource consumption in WLAN firmware when peer is freed in non qos state. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-400: Uncontrolled Resource Consumption •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40512 – Buffer over-read in WLAN Firmware.
https://notcve.org/view.php?id=CVE-2022-40512
09 Feb 2023 — Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-40502 – Improper input validation in WLAN Host
https://notcve.org/view.php?id=CVE-2022-40502
09 Feb 2023 — Transient DOS due to improper input validation in WLAN Host. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-34146 – Improper input validation in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34146
09 Feb 2023 — Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-34145 – Buffer over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34145
09 Feb 2023 — Transient DOS due to buffer over-read in WLAN Host while parsing frame information. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •