Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3g76-f9xq-8vp6 | Vert.x has a DoS via unbounded server-side SNI SslContext cache growth |
Tue, 12 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Wildcard Server Name Misuse in TLS Handshake Enables Client to Connect to Any Subdomain |
Tue, 12 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 06 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse vert.x |
|
| Vendors & Products |
Eclipse
Eclipse vert.x |
Wed, 06 May 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Wildcard Server Name Misuse in TLS Handshake Enables Client to Connect to Any Subdomain | |
| Weaknesses | CWE-295 |
Wed, 06 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A TCP client can perform a TLS handshake and present the server name extension with a server name that is accepted by a server wildcard name, e.g. if the server is configured with a certificate accepting *.example.com, any XYZ.example.com where xyz is a valid name can be used. | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-05-12T20:29:09.712Z
Reserved: 2026-04-22T13:02:37.222Z
Link: CVE-2026-6860
Updated: 2026-05-06T14:33:32.075Z
Status : Analyzed
Published: 2026-05-06T10:16:26.293
Modified: 2026-05-12T13:42:01.617
Link: CVE-2026-6860
No data.
OpenCVE Enrichment
Updated: 2026-05-12T16:00:13Z
Github GHSA