Vulnerabilities in uIP