{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/compiler/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve","buffer_overflow","compiler"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eZen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability (CVE-2026-33491) exists within the Zen C compiler. This flaw allows a malicious actor to craft a Zen C source file (\u003ccode\u003e.zc\u003c/code\u003e) containing excessively long struct, function, or trait identifiers. Successful exploitation of this vulnerability can lead to a compiler crash, causing disruption to development workflows, or potentially allow the attacker to…\u003c/p\u003e\n","date_modified":"2026-03-27T12:00:00Z","date_published":"2026-03-27T12:00:00Z","id":"/briefs/2026-03-zen-c-overflow/","summary":"A stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.","title":"Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)","url":"https://feed.craftedsignal.io/briefs/2026-03-zen-c-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Compiler","version":"https://jsonfeed.org/version/1.1"}