{"vulnerability": "CVE-2025-1400", "sightings": [{"uuid": "6f756b72-e23d-4749-a59b-f27c94e05050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1400", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxykcbuq2r", "content": "", "creation_timestamp": "2025-05-07T08:26:23.722926Z"}, {"uuid": "f0a37b71-cf28-41cb-a7cf-a5204d7db8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1400", "type": "seen", "source": "https://t.me/cvedetector/24681", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1400 - \"PLCTag Lib Overread Buffer Read\"\", \n  \"Content\": \"CVE ID : CVE-2025-1400 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : Out-of-bounds Read vulnerability in\u00a0unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:26.000000Z"}, {"uuid": "7df46ad2-3fdb-4010-98a9-e77bda36646f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14004", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m766ourw2z2a", "content": "", "creation_timestamp": "2025-12-04T14:29:56.691251Z"}, {"uuid": "ab2aa818-9d5b-45a1-9bf1-60e783375235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14005", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m766wkf5eb2s", "content": "", "creation_timestamp": "2025-12-04T14:34:13.852705Z"}, {"uuid": "96a63883-36b5-42b7-b437-04d58d77a7d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14001", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mccplq7p2f2m", "content": "", "creation_timestamp": "2026-01-13T13:58:39.011754Z"}, {"uuid": "e2265437-e5fc-4d6a-943e-94ac78071603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-14009", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mf5pnybld22m", "content": "", "creation_timestamp": "2026-02-18T18:32:10.057312Z"}, {"uuid": "cf855b8b-b54e-4127-b675-74ebfa737975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-14009", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mf5rababgq2h", "content": "", "creation_timestamp": "2026-02-18T19:00:18.439852Z"}, {"uuid": "6a8d3aea-99a0-49d8-a7b3-e234836a36c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14002", "type": "seen", "source": "https://gist.github.com/Darkcrai86/79e40618df71ce1c3a82b45a755a694a", "content": "", "creation_timestamp": "2025-12-16T10:55:33.000000Z"}, {"uuid": "93ebc5b6-6b66-4563-98a2-51fc54357622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14002", "type": "seen", "source": "https://gist.github.com/Darkcrai86/e0ffaf1582dc295a5ee059889fb0e2c3", "content": "", "creation_timestamp": "2025-12-16T11:15:38.000000Z"}, {"uuid": "a86af8fc-b11a-426c-ab06-4ef694dab65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14000", "type": "seen", "source": "https://gist.github.com/Darkcrai86/38b88dd0bbe8f31b6abf8de4001a191e", "content": "", "creation_timestamp": "2025-12-23T13:09:28.000000Z"}, {"uuid": "0fa4d418-404e-4d3f-9603-ff892e50e869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14000", "type": "seen", "source": "https://gist.github.com/Darkcrai86/319741ab43d82cddfa549145e264c93b", "content": "", "creation_timestamp": "2025-12-23T13:34:33.000000Z"}, {"uuid": "34d7a6ec-dac8-44b4-b762-9c1297aaaf3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1400", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15280", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1400\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Out-of-bounds Read vulnerability in\u00a0unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.\n\ud83d\udccf Published: 2025-05-07T07:04:29.943Z\n\ud83d\udccf Modified: 2025-05-07T07:04:29.943Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1400", "creation_timestamp": "2025-05-07T07:22:09.000000Z"}]}