{"vulnerability": "CVE-2025-4775", "sightings": [{"uuid": "b410dec5-5cd1-46ca-9b93-566f7b5d306d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47753", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7yxtrg24", "content": "", "creation_timestamp": "2025-05-19T09:13:37.687992Z"}, {"uuid": "53041828-27d2-4655-b154-60a0e9fb4577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47750", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7z3e322w", "content": "", "creation_timestamp": "2025-05-19T09:13:38.221068Z"}, {"uuid": "145a977d-d14d-4b33-8c3a-ed37c18a40b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47759", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpjaa2djb32v", "content": "", "creation_timestamp": "2025-05-19T09:13:45.071746Z"}, {"uuid": "5cc50931-dbd0-4bb5-bf55-63a1eace058b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47755", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpjaa2h4au2h", "content": "", "creation_timestamp": "2025-05-19T09:13:45.641217Z"}, {"uuid": "0530f94a-7225-4d01-b3c8-a9c553a41464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47752", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7z6ayf2s", "content": "", "creation_timestamp": "2025-05-19T09:13:38.800861Z"}, {"uuid": "a94f04d0-d082-4897-b5a8-c600d23c1d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47757", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7zbmcn2t", "content": "", "creation_timestamp": "2025-05-19T09:13:39.366583Z"}, {"uuid": "ad33d0c3-dd35-4e52-8305-b949f2a6ba7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47751", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114533793976057122", "content": "", "creation_timestamp": "2025-05-19T09:30:03.327332Z"}, {"uuid": "c541f43b-1f7c-4617-a60b-3c3bdbb5cb4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4775", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrrl27wv6725", "content": "", "creation_timestamp": "2025-06-17T03:38:54.375865Z"}, {"uuid": "7ce64542-2eeb-4c1a-942f-acbca11262d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47751", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7zpnig24", "content": "", "creation_timestamp": "2025-05-19T09:13:41.626466Z"}, {"uuid": "6fda5749-7c2e-4c22-a810-a73350774910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47756", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpjaa2aofg2p", "content": "", "creation_timestamp": "2025-05-19T09:13:44.503493Z"}, {"uuid": "80e6cadf-6873-40e8-9377-3443662dbea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47758", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpja7zwrxy2n", "content": "", "creation_timestamp": "2025-05-19T09:13:42.799804Z"}, {"uuid": "44727cce-a867-44a7-a2ca-049dad64a78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47754", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpjaa222io24", "content": "", "creation_timestamp": "2025-05-19T09:13:43.366923Z"}, {"uuid": "9c996eb4-803e-46a0-922f-f3c462e9ff52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47752", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16828", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47752\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6ComFile!MakeItemGlidZahyou function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:44:58.141Z\n\ud83d\udccf Modified: 2025-05-19T07:44:58.141Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:28.000000Z"}, {"uuid": "a6dff231-ef29-4a5a-ad44-3ac100233f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47755", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16825", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47755\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!VS4_SaveEnvFile function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:46:09.956Z\n\ud83d\udccf Modified: 2025-05-19T07:46:09.956Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:25.000000Z"}, {"uuid": "33dc9807-a067-42e7-bed3-de732660910d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47756", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47756\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!CGamenDataRom::set_mr400_strc function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:46:38.474Z\n\ud83d\udccf Modified: 2025-05-19T07:46:38.474Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:23.000000Z"}, {"uuid": "b540cf67-73f5-4480-8638-949610d73776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47757", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16823", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47757\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6MemInIF.dll!set_plc_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:47:16.674Z\n\ud83d\udccf Modified: 2025-05-19T07:47:16.674Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:22.000000Z"}, {"uuid": "6c355919-7229-4f5c-a44e-824afda51e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47758", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16822", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47758\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6File!CTxSubFile::get_ProgramFile_name function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:47:32.122Z\n\ud83d\udccf Modified: 2025-05-19T07:47:32.122Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:21.000000Z"}, {"uuid": "65abc881-6210-450a-87e5-51839a4e5aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47759", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16821", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47759\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:47:43.969Z\n\ud83d\udccf Modified: 2025-05-19T07:47:43.969Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:20.000000Z"}, {"uuid": "ca825d5f-cc8d-4429-b69f-9e27e611467d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47753", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16827", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47753\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!CDrawSLine::GetRectArea function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:45:27.403Z\n\ud83d\udccf Modified: 2025-05-19T07:45:27.403Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:27.000000Z"}, {"uuid": "f0c71947-20f0-4ab8-8555-276cb7ab2abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47754", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16826", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47754\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!Conv_Macro_Data function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:45:52.316Z\n\ud83d\udccf Modified: 2025-05-19T07:45:52.316Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:26.000000Z"}, {"uuid": "1ac9283c-5bd6-48b1-b0fc-b4fa11c29e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47750", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16830", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47750\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6MemInIF!set_temp_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:44:11.819Z\n\ud83d\udccf Modified: 2025-05-19T07:44:11.819Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:30.000000Z"}, {"uuid": "98c4a880-9bd2-4328-845f-cb3ef14d9e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47751", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47751\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.\n\ud83d\udccf Published: 2025-05-19T07:44:36.296Z\n\ud83d\udccf Modified: 2025-05-19T07:44:36.296Z\n\ud83d\udd17 References:\n1. https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php\n2. https://jvn.jp/en/vu/JVNVU97228144/", "creation_timestamp": "2025-05-19T08:38:30.000000Z"}]}