Analyze the attack process presenting the technical weaknesses and explaining the CVE instances at a similar technical depth
1. Integer overflow attacks with code snipperts from Qualcomm components (CVE 2015-8940)
2. Privilege escalation by taking advantage of the code that does not do user input validation (CVE 2014-9865, 2015-8942)
3. Indexes are not validated (CVE 2014-9869)
4. Uninitialized data structures (CVE 2016-3743) causes DOS and execution of arbitrary code
Attachment:- Aassignment File.rar