Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: libplctag

Found 2 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2025-1399
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 6 months, 3 weeks ago by @Erethon Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @Erethon published on GitHub
Out-of-bounds Read in libplctag library

Out-of-bounds Read vulnerability in unpack_response (session.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.

Affected products

libplctag
  • =<2.6.3

Matching in nixpkgs

pkgs.libplctag

Library that uses EtherNet/IP or Modbus TCP to read and write tags in PLCs

Package maintainers

Untriaged
Permalink CVE-2025-1400
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 11 months, 1 week ago
Out-of-bounds Read in libplctag library

Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.

Affected products

libplctag
  • =<2.6.3

Matching in nixpkgs

pkgs.libplctag

Library that uses EtherNet/IP or Modbus TCP to read and write tags in PLCs

Package maintainers