Filter
AND
-Infinity
0

NaranjascontocadosInsufficient boundary checks for DIO and DAO messages in RPL-Lite in Contiki-NG

8.6
First published (updated )

NaranjascontocadosOut-of-Bounds Read in contiki-ng

7.3
First published (updated )

NaranjascontocadosUnvalidated DIO prefix info length in RPL-Lite in Contiki-NG

7.5
First published (updated )

NaranjascontocadosOut-of-bounds write in the radio driver for Contiki-NG nRF platforms

7.6
First published (updated )

NaranjascontocadosUncontrolled recursion due to insufficient validation of the IPv6 source routing header in Contiki-NG

8.7
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

NaranjascontocadosOut-of-bounds read in SNMP when decoding a string in Contiki-NG

8.4
First published (updated )

NaranjascontocadosOut-of-bounds read when decoding SNMP messages in Contiki-NG

8.4
First published (updated )

NaranjascontocadosUnaligned memory access in RPL option processing in Contiki-NG

7.5
First published (updated )

NaranjascontocadosBuffer Overflow

7.8
First published (updated )

NaranjascontocadosBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

NaranjascontocadosBuffer Overflow

7.8
First published (updated )

NaranjascontocadosAn issue was discovered in Contiki-NG through 4.1. There is a buffer over-read in lookup in os/stora…

First published (updated )

NaranjascontocadosInteger Underflow, Buffer Overflow

7.5
First published (updated )

uIPThe code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does no…

8.2
First published (updated )

uIPAn issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing l…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/open-iscsiInteger Overflow

7.5
First published (updated )

NaranjascontocadosBuffer Overflow

8.8
First published (updated )

NaranjascontocadosBuffer overflow in contiki-ng

8.1
First published (updated )

NaranjascontocadosInfinite loop in IPv6 neighbor solicitation processing

7.8
First published (updated )

NaranjascontocadosOut-of-bounds write in RPL-Classic and RPL-Lite

8.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

NaranjascontocadosOut-of-bounds read when decompressing UDP header

8.8
First published (updated )

NaranjascontocadosOut-of-bounds write when decompressing 6LoWPAN payload in Contiki-NG

8.8
First published (updated )

NaranjascontocadosOut-of-bounds read in the uIP buffer module

8.8
First published (updated )

NaranjascontocadosOut-of-bounds read in IPv6 neighbor solicitation in Contiki-NG

7.5
First published (updated )

NaranjascontocadosContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versi…

8.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203