{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-33851/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2026-33851","buffer-overflow","doslib"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2026-33851 describes a memory buffer overflow vulnerability within the doslib library developed by joncampbell123. This vulnerability exists in versions of doslib prior to doslib-20250729. The vulnerability is due to improper restriction of operations within the bounds of a memory buffer, a classic coding error that can lead to exploitable conditions. While specific exploitation details are not provided in the source, the nature of the vulnerability (CWE-119) indicates the potential for…\u003c/p\u003e\n","date_modified":"2026-03-24T06:16:22Z","date_published":"2026-03-24T06:16:22Z","id":"/briefs/2026-03-doslib-buffer-overflow/","summary":"An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.","title":"doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)","url":"https://feed.craftedsignal.io/briefs/2026-03-doslib-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-33851","version":"https://jsonfeed.org/version/1.1"}