Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rpl vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2021-27698
RIOT-OS 2021.01 contains a buffer overflow vulnerability in /sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c through the _parse_options() function.
Riot-os Riot 2021.01
9.8
CVSSv3
CVE-2021-27697
RIOT-OS 2021.01 contains a buffer overflow vulnerability in sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c through the gnrc_rpl_validation_options() function.
Riot-os Riot 2021.01
7.5
CVSSv3
CVE-2023-2156
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote malicious user to ...
Linux Linux Kernel
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 38
Debian Debian Linux 10.0
NA
CVE-2007-6450
The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote malicious users to cause a denial of service (infinite loop) via unknown vectors.
Wireshark Wireshark 0.9.8
Wireshark Wireshark 0.99
Wireshark Wireshark 0.99.6
Wireshark Wireshark 0.99.2
Wireshark Wireshark 0.99.3
Wireshark Wireshark 0.99.4
Wireshark Wireshark 0.99.5
Wireshark Wireshark 0.99.0
Wireshark Wireshark 0.99.1
7.5
CVSSv3
CVE-2021-28362
An issue exists in Contiki up to and including 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are ...
Contiki-os Contiki
8.1
CVSSv3
CVE-2021-32771
Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG...
Contiki-ng Contiki-ng
9.8
CVSSv3
CVE-2022-35927
Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length p...
Contiki-ng Contiki-ng
9.8
CVSSv3
CVE-2021-21282
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions before 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been pa...
Contiki-ng Contiki-ng
NA
CVE-2007-4447
Multiple buffer overflows in the client in Toribash 2.71 and previous versions allow remote malicious users to (1) execute arbitrary code via a long game command in a replay (.rpl) file and (2) cause a denial of service (application crash) via a long SAY command that omits a requ...
Toribash Toribash
NA
CVE-2023-50926
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of th...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »