VYPR

Maven package

org.bouncycastle/bcprov-jdk15on

pkg:maven/org.bouncycastle/bcprov-jdk15on

Vulnerabilities (24)

  • CVE-2018-5382Apr 16, 2018
    affected < 1.50fixed 1.50

    The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated p

  • CVE-2017-13098HigDec 13, 2017
    affected < 1.0.3fixed 1.0.3

    BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a

  • CVE-2015-7940Nov 9, 2015
    affected < 1.51fixed 1.51

    The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."

  • CVE-2013-1624Feb 8, 2013
    affected < 1.48fixed 1.48

    The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct dis

Page 2 of 2