<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-4680 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4680/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 01:17:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4680/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-fedcm-uaf/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-fedcm-uaf/</guid><description>A use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.</description><content:encoded>&lt;p>A use-after-free vulnerability, identified as CVE-2026-4680, exists in the FedCM implementation of Google Chrome. This flaw affects versions prior to 146.0.7680.165. Exploitation is possible by a remote attacker who crafts a malicious HTML page. Successful exploitation allows for arbitrary code execution within the Chrome sandbox, potentially leading to further compromise. The Chromium security team has rated this vulnerability as High severity. This issue impacts users across Windows, Linux…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-4680</category><category>use-after-free</category><category>chrome</category><category>fedcm</category></item></channel></rss>