Vulnerabilities in TCP/IP stack