Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to version 4.6.5 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 05 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 01 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* |
Fri, 01 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 01 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wireshark
Wireshark wireshark |
|
| Vendors & Products |
Wireshark
Wireshark wireshark |
Thu, 30 Apr 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution | |
| Title | Heap-based Buffer Overflow in Wireshark | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-05-01T15:27:02.931Z
Reserved: 2026-04-02T06:33:11.664Z
Link: CVE-2026-5402
Updated: 2026-04-30T12:50:59.162Z
Status : Analyzed
Published: 2026-04-30T07:16:37.847
Modified: 2026-05-01T19:26:27.377
Link: CVE-2026-5402
OpenCVE Enrichment
Updated: 2026-05-01T05:30:09Z