Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ni
Ni dasylab |
|
| CPEs | cpe:2.3:a:ni:dasylab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ni
Ni dasylab |
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Digilent
Digilent dasylab |
|
| Vendors & Products |
Digilent
Digilent dasylab |
Sun, 15 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab. | |
| Title | Out-Of-Bounds Read When Opening a Corrupt File in Digilent DASYLab | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NI
Published:
Updated: 2026-03-15T01:51:19.093Z
Reserved: 2026-01-14T19:16:23.783Z
Link: CVE-2026-0955
Updated: 2026-03-15T01:50:44.693Z
Status : Analyzed
Published: 2026-03-13T19:53:57.400
Modified: 2026-03-19T17:41:49.907
Link: CVE-2026-0955
No data.
OpenCVE Enrichment
Updated: 2026-03-23T12:02:54Z