<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector.]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. <a href="https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b" rel="nofollow noopener"><span>https://</span><span>radar.offseq.com/threat/cve-20</span><span>26-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b</span></a> <a href="https://infosec.exchange/tags/OffSeq" rel="tag">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Wireshark" rel="tag">#<span>Wireshark</span></a> <a href="https://infosec.exchange/tags/CVE20265402" rel="tag">#<span>CVE20265402</span></a> <a href="https://infosec.exchange/tags/BlueTeam" rel="tag">#<span>BlueTeam</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/acf46f64-fdf8-4a67-b463-50f42f01d241/cve-2026-5402-high-severity-heap-buffer-overflow-in-wireshark-4.6.0-4.6.4-tls-dissector.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:16 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/acf46f64-fdf8-4a67-b463-50f42f01d241.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 Apr 2026 07:30:28 GMT</pubDate><ttl>60</ttl></channel></rss>