Description
Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 30 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keyence vt5-wx12
Keyence vt5-wx12 Firmware Keyence vt5-wx15 Keyence vt5-wx15 Firmware |
|
| CPEs | cpe:2.3:h:keyence:vt5-wx12:-:*:*:*:*:*:*:* cpe:2.3:h:keyence:vt5-wx15:-:*:*:*:*:*:*:* cpe:2.3:o:keyence:vt5-wx12_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:keyence:vt5-wx15_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Keyence vt5-wx12
Keyence vt5-wx12 Firmware Keyence vt5-wx15 Keyence vt5-wx15 Firmware |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 25 Sep 2024 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keyence
Keyence kv Replay Viewer Keyence kv Studio |
|
| CPEs | cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:* cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Keyence
Keyence kv Replay Viewer Keyence kv Studio |
|
| References |
|
|
| Metrics |
ssvc
|
Wed, 25 Sep 2024 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file. | Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file. |
| References |
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-25T03:52:10.512Z
Reserved: 2024-03-19T02:07:19.158Z
Link: CVE-2024-29218
Updated: 2024-08-02T01:10:55.392Z
Status : Analyzed
Published: 2024-04-15T11:15:08.533
Modified: 2025-06-30T13:57:35.287
Link: CVE-2024-29218
No data.
OpenCVE Enrichment
No data.
Weaknesses