All the vulnerabilites related to Fuji Electric Co., Ltd. - V-SFT-6
jvndb-2025-005107
Vulnerability from jvndb
Published
2025-05-16 14:32
Modified
2025-05-16 14:32
Severity ?
Summary
Multiple vulnerabilities in V-SFT
Details
V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.
<ul>
<li>Free of Pointer not at Start of Buffer in VS6EditData.dll!CWinFontInf::WinFontMsgCheck function (CWE-761)</li>
<ul><li>CVE-2025-47749</li></ul>
<li>Out-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)</li>
<ul><li>CVE-2025-47750</li></ul>
<li>Out-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)</li>
<ul><li>CVE-2025-47751</li></ul>
<li>Out-of-bounds Write in VS6ComFile!MakeItemGlidZahyou function (CWE-787)</li>
<ul><li>CVE-2025-47752</li></ul>
<li>Out-of-bounds Read in VS6EditData!CDrawSLine::GetRectArea function(CWE-125)</li>
<ul><li>CVE-2025-47753</li></ul>
<li>Out-of-bounds Read in VS6EditData!Conv_Macro_Data function (CWE-125)</li>
<ul><li>CVE-2025-47754</li></ul>
<li>Out-of-bounds Read in VS6EditData!VS4_SaveEnvFile function (CWE-125)</li>
<ul><li>CVE-2025-47755</li></ul>
<li>Out-of-bounds Read in VS6EditData!CGamenDataRom::set_mr400_strc function (CWE-125)</li>
<ul><li>CVE-2025-47756</li></ul>
<li>Out-of-bounds Read in VS6MemInIF.dll!set_plc_type_default function (CWE-125)</li>
<ul><li>CVE-2025-47757</li></ul>
<li>Stack-based Buffer Overflow in VS6File!CTxSubFile::get_ProgramFile_name function (CWE-121)</li>
<ul><li>CVE-2025-47758</li></ul>
<li>Stack-based Buffer Overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function (CWE-121)</li>
<ul><li>CVE-2025-47759</li></ul>
<li>Stack-based Buffer Overflow in VS6MemInIF!set_temp_type_default function (CWE-121)</li>
<ul><li>CVE-2025-47760</li></ul>
</ul>
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Fuji Electric Co., Ltd. | V-SFT-6 |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-005107.html", "dc:date": "2025-05-16T14:32+09:00", "dcterms:issued": "2025-05-16T14:32+09:00", "dcterms:modified": "2025-05-16T14:32+09:00", "description": "V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.\r\n\r\n\r\n\u003cul\u003e\r\n\u003cli\u003eFree of Pointer not at Start of Buffer in VS6EditData.dll!CWinFontInf::WinFontMsgCheck function (CWE-761)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47749\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47750\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47751\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6ComFile!MakeItemGlidZahyou function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47752\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!CDrawSLine::GetRectArea function(CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47753\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!Conv_Macro_Data function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47754\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!VS4_SaveEnvFile function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47755\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!CGamenDataRom::set_mr400_strc function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47756\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6MemInIF.dll!set_plc_type_default function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47757\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6File!CTxSubFile::get_ProgramFile_name function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47758\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47759\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6MemInIF!set_temp_type_default function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47760\u003c/li\u003e\u003c/ul\u003e\r\n\u003c/ul\u003e\r\n\r\nMichael Heinzl reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-005107.html", "sec:cpe": { "#text": "cpe:/a:fujielectric:v-sft-6", "@product": "V-SFT-6", "@vendor": "Fuji Electric Co., Ltd.", "@version": "2.2" }, "sec:cvss": { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2025-005107", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU97228144/index.html", "@id": "JVNVU#97228144", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47749", "@id": "CVE-2025-47749", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47750", "@id": "CVE-2025-47750", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47751", "@id": "CVE-2025-47751", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47752", "@id": "CVE-2025-47752", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47753", "@id": "CVE-2025-47753", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47754", "@id": "CVE-2025-47754", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47755", "@id": "CVE-2025-47755", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47756", "@id": "CVE-2025-47756", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47757", "@id": "CVE-2025-47757", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47758", "@id": "CVE-2025-47758", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47759", "@id": "CVE-2025-47759", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47760", "@id": "CVE-2025-47760", "@source": "CVE" }, { "#text": "https://cwe.mitre.org/data/definitions/121.html", "@id": "CWE-121", "@title": "Stack-based Buffer Overflow(CWE-121)" }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)" }, { "#text": "https://cwe.mitre.org/data/definitions/761.html", "@id": "CWE-761", "@title": "Free of Pointer not at Start of Buffer(CWE-761)" }, { "#text": "https://cwe.mitre.org/data/definitions/787.html", "@id": "CWE-787", "@title": "Out-of-bounds Write(CWE-787)" } ], "title": "Multiple vulnerabilities in V-SFT" }