Skip to content
Threat Feed

March 2026 (30)

medium advisory

CrowdStrike Falcon SIEM Integrates with Microsoft Defender EDR

CrowdStrike Falcon Next-Gen SIEM is expanding its capabilities to integrate with third-party EDR solutions, starting with Microsoft Defender, to enable organizations to extend their AI-native SOC across heterogeneous environments without replacing existing endpoint agents.

siem edr microsoft-defender crowdstrike-falcon
2r 1t
medium advisory

CrowdStrike Innovations Secure AI Agents and Govern Shadow AI

CrowdStrike is introducing innovations to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by extending AI detection and response (AIDR) capabilities to cover desktop AI applications and provide visibility into AI-related components, helping to prevent prompt attacks, data leaks, and policy violations.

AI AI-Security Shadow-AI Endpoint-Security SaaS Cloud
2r 2t
medium advisory

Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR integrates with NVIDIA NeMo Guardrails to provide comprehensive protection for AI agents against prompt injection, data leaks, and malicious content.

ai security agentic-soc
2r 2t
medium advisory

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike has enhanced its CNAPP capabilities by adding application-layer visibility and prioritizing risks based on known adversary tactics, techniques, and procedures (TTPs).

Lazarus Group +10 cloud-security cnapp threat-intelligence risk-prioritization
2r 2t
high advisory

SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension

A SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.

sql-injection vulnerability pandasai
2r 1t
critical advisory

Crashmail 1.6 Stack-Based Buffer Overflow Vulnerability

Crashmail 1.6 is vulnerable to a stack-based buffer overflow, allowing remote attackers to execute arbitrary code via malicious input and potentially leading to denial of service.

buffer-overflow remote-code-execution cve-2018-25223
2r 5t
critical advisory

EChat Server 3.1 Buffer Overflow Vulnerability in chat.ghp Endpoint

EChat Server 3.1 is vulnerable to a buffer overflow in the chat.ghp endpoint, allowing remote attackers to execute arbitrary code by sending a crafted GET request with an oversized username parameter.

buffer-overflow code-execution echat
2r 1t
high advisory

Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)

Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.

cve-2017-20228 buffer-overflow local-privilege-escalation
2r 1t
high advisory

SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)

SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.

buffer-overflow code-execution CVE-2018-25222
2r 1t
critical advisory

JAD Java Decompiler Stack-Based Buffer Overflow Vulnerability

JAD Java Decompiler 1.5.8e-1kali1 and prior is vulnerable to a stack-based buffer overflow, allowing attackers to execute arbitrary code by providing overly long input to the jad command leading to a return-oriented programming chain execution and shell spawning.

cve buffer_overflow java_decompiler
2r 2t
high advisory

PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability

PInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.

buffer-overflow local-privilege-escalation cve-2016-20044
2r 1t
high advisory

Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)

Multi Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.

cve buffer overflow code execution
2r 1t
high advisory

TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)

TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.

cve-2016-20040 buffer-overflow local-privilege-escalation
2r 1t
high advisory

yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)

yTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.

cve-2016-20038 buffer-overflow local-code-execution
2r 1t
high advisory

xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)

A stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.

cve buffer-overflow code-execution
2r 3t
high advisory

Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage

A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.

ssrf vulnerability clerk cloud
2r 1t
high advisory

LibreChat SSRF Vulnerability (CVE-2026-31943)

LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.

ssrf librechat cve-2026-31943
2r 2t
high threat

Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season

The Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.

Silver Fox silverfox spearphishing valleyrat japan taxseason remoteaccesstrojan
2r 5t
critical threat

TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware

The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.

TeamPCP supply chain attack pypi credential theft steganography
2r 5t
critical advisory

Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)

A stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.

tenda router buffer overflow cve-2026-4975
2r 1t
high advisory

Undertow Request Smuggling Vulnerability (CVE-2026-28368)

CVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.

undertow request-smuggling cve-2026-28368
2r 1t
high advisory

LangChain Core Path Traversal Vulnerability in Legacy APIs

A path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.

langchain path-traversal vulnerability
1r 1t
medium advisory

CrowdStrike Falcon Enhancements for Securing AI Environments

CrowdStrike is enhancing its Falcon platform with new features focusing on AI Detection and Response (AIDR) capabilities across endpoints, SaaS, and cloud environments to mitigate risks such as prompt injection attacks, data leaks, and policy violations related to AI agents and shadow AI.

ai security falcon agentic-soc prompt-injection
2r 2t
medium advisory

CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.

Lazarus Group +10 cloud-security cnaap risk-prioritization
2r 3t
medium advisory

CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization

CrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.

Lazarus Group +10 cloud cnapp risk-prioritization
2r 8t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.

agentic-soc mdr soc ai
2r 2t
high advisory

CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI

CrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.

ai shadow-ai prompt-injection data-leak endpoint-security
2r 3t
medium advisory

CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations

CrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.

ai automation security operations soar
2r
medium advisory

CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation

CrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.

agentic-soc ai-security automation
2r 2t
medium advisory

CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools

CrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.

SIEM EDR Microsoft Defender
2r