{"uuid": "84663bc7-fdff-4601-8c09-0e78bc6ed573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-5402", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116492483168335299", "content": "\u26a0\ufe0f CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 \u2013 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet \u2014 avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam", "creation_timestamp": "2026-04-30T07:30:28.749008Z"}