<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve20265402]]></title><description><![CDATA[A list of topics that have been tagged with cve20265402]]></description><link>https://board.circlewithadot.net/tags/cve20265402</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:16:33 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve20265402.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector.]]></title><description><![CDATA[️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam]]></description><link>https://board.circlewithadot.net/topic/acf46f64-fdf8-4a67-b463-50f42f01d241/cve-2026-5402-high-severity-heap-buffer-overflow-in-wireshark-4.6.0-4.6.4-tls-dissector.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/acf46f64-fdf8-4a67-b463-50f42f01d241/cve-2026-5402-high-severity-heap-buffer-overflow-in-wireshark-4.6.0-4.6.4-tls-dissector.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>