Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch. | |
| Title | Zen-C has Stack-Based Buffer Overflow in Identifier Mangling | |
| Weaknesses | CWE-121 CWE-787 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T19:52:10.550Z
Reserved: 2026-03-20T16:16:48.971Z
Link: CVE-2026-33491
Updated: 2026-03-26T19:50:33.517Z
Status : Received
Published: 2026-03-26T19:17:04.333
Modified: 2026-03-26T19:17:04.333
Link: CVE-2026-33491
No data.
OpenCVE Enrichment
No data.