All the vulnerabilites related to Fuji Electric Co., Ltd. - V-SFT-6
jvndb-2025-005107
Vulnerability from jvndb
Published
2025-05-16 14:32
Modified
2025-05-16 14:32
Severity ?
Summary
Multiple vulnerabilities in V-SFT
Details
V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below. <ul> <li>Free of Pointer not at Start of Buffer in VS6EditData.dll!CWinFontInf::WinFontMsgCheck function (CWE-761)</li> <ul><li>CVE-2025-47749</li></ul> <li>Out-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)</li> <ul><li>CVE-2025-47750</li></ul> <li>Out-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)</li> <ul><li>CVE-2025-47751</li></ul> <li>Out-of-bounds Write in VS6ComFile!MakeItemGlidZahyou function (CWE-787)</li> <ul><li>CVE-2025-47752</li></ul> <li>Out-of-bounds Read in VS6EditData!CDrawSLine::GetRectArea function(CWE-125)</li> <ul><li>CVE-2025-47753</li></ul> <li>Out-of-bounds Read in VS6EditData!Conv_Macro_Data function (CWE-125)</li> <ul><li>CVE-2025-47754</li></ul> <li>Out-of-bounds Read in VS6EditData!VS4_SaveEnvFile function (CWE-125)</li> <ul><li>CVE-2025-47755</li></ul> <li>Out-of-bounds Read in VS6EditData!CGamenDataRom::set_mr400_strc function (CWE-125)</li> <ul><li>CVE-2025-47756</li></ul> <li>Out-of-bounds Read in VS6MemInIF.dll!set_plc_type_default function (CWE-125)</li> <ul><li>CVE-2025-47757</li></ul> <li>Stack-based Buffer Overflow in VS6File!CTxSubFile::get_ProgramFile_name function (CWE-121)</li> <ul><li>CVE-2025-47758</li></ul> <li>Stack-based Buffer Overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function (CWE-121)</li> <ul><li>CVE-2025-47759</li></ul> <li>Stack-based Buffer Overflow in VS6MemInIF!set_temp_type_default function (CWE-121)</li> <ul><li>CVE-2025-47760</li></ul> </ul> Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-005107.html",
  "dc:date": "2025-05-16T14:32+09:00",
  "dcterms:issued": "2025-05-16T14:32+09:00",
  "dcterms:modified": "2025-05-16T14:32+09:00",
  "description": "V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.\r\n\r\n\r\n\u003cul\u003e\r\n\u003cli\u003eFree of Pointer not at Start of Buffer in VS6EditData.dll!CWinFontInf::WinFontMsgCheck function (CWE-761)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47749\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47750\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6MemInIF!set_temp_type_default function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47751\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Write in VS6ComFile!MakeItemGlidZahyou function (CWE-787)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47752\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!CDrawSLine::GetRectArea function(CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47753\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!Conv_Macro_Data function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47754\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!VS4_SaveEnvFile function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47755\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6EditData!CGamenDataRom::set_mr400_strc function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47756\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eOut-of-bounds Read in VS6MemInIF.dll!set_plc_type_default function (CWE-125)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47757\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6File!CTxSubFile::get_ProgramFile_name function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47758\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47759\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003cli\u003eStack-based Buffer Overflow in VS6MemInIF!set_temp_type_default function (CWE-121)\u003c/li\u003e\r\n\u003cul\u003e\u003cli\u003eCVE-2025-47760\u003c/li\u003e\u003c/ul\u003e\r\n\u003c/ul\u003e\r\n\r\nMichael Heinzl reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.",
  "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-005107.html",
  "sec:cpe": {
    "#text": "cpe:/a:fujielectric:v-sft-6",
    "@product": "V-SFT-6",
    "@vendor": "Fuji Electric Co., Ltd.",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "7.8",
    "@severity": "High",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2025-005107",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU97228144/index.html",
      "@id": "JVNVU#97228144",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47749",
      "@id": "CVE-2025-47749",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47750",
      "@id": "CVE-2025-47750",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47751",
      "@id": "CVE-2025-47751",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47752",
      "@id": "CVE-2025-47752",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47753",
      "@id": "CVE-2025-47753",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47754",
      "@id": "CVE-2025-47754",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47755",
      "@id": "CVE-2025-47755",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47756",
      "@id": "CVE-2025-47756",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47757",
      "@id": "CVE-2025-47757",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47758",
      "@id": "CVE-2025-47758",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47759",
      "@id": "CVE-2025-47759",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-47760",
      "@id": "CVE-2025-47760",
      "@source": "CVE"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/121.html",
      "@id": "CWE-121",
      "@title": "Stack-based Buffer Overflow(CWE-121)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/125.html",
      "@id": "CWE-125",
      "@title": "Out-of-bounds Read(CWE-125)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/761.html",
      "@id": "CWE-761",
      "@title": "Free of Pointer not at Start of Buffer(CWE-761)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/787.html",
      "@id": "CWE-787",
      "@title": "Out-of-bounds Write(CWE-787)"
    }
  ],
  "title": "Multiple vulnerabilities in V-SFT"
}