<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4676 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4676/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 01:17:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4676/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-uaf/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-uaf/</guid><description>A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.</description><content:encoded>&lt;p>CVE-2026-4676 is a use-after-free vulnerability affecting Google Chrome versions prior to 146.0.7680.165. This flaw resides within the Dawn component of Chrome and can be triggered by a remote attacker who crafts a malicious HTML page. Successful exploitation could lead to a sandbox escape, granting the attacker elevated privileges within the system. This vulnerability was patched in the March 23, 2026 stable channel update for desktop. The vulnerability affects users on Windows, Linux, and…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>sandbox-escape</category><category>chrome</category><category>cve-2026-4676</category></item></channel></rss>