Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ahmw-gd8w-f7cd
Summary
Improper Input Validation in Bouncy Castle
The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Aliases
0
alias CVE-2013-1624
1
alias GHSA-8353-fgcr-xfhx
Fixed_packages
0
url pkg:deb/debian/bouncycastle@1.48%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/bouncycastle@1.48%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.48%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/bouncycastle@1.49%2Bdfsg-3
purl pkg:deb/debian/bouncycastle@1.49%2Bdfsg-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-amzx-sbps-xke5
3
vulnerability VCID-crf9-zn1q-vya8
4
vulnerability VCID-ddqw-aj7g-s7c2
5
vulnerability VCID-f4qa-9fn6-97az
6
vulnerability VCID-f73y-mjrg-yfc9
7
vulnerability VCID-jr7u-m7gc-pydy
8
vulnerability VCID-jua2-2byr-t3cv
9
vulnerability VCID-ka8b-44hx-mkc5
10
vulnerability VCID-nau9-4auz-pqbs
11
vulnerability VCID-pybm-wf4t-pbdg
12
vulnerability VCID-qr8s-5r61-skhw
13
vulnerability VCID-tnen-a68v-9bfk
14
vulnerability VCID-waqt-x8vm-qyez
15
vulnerability VCID-xpm3-yad2-mke2
16
vulnerability VCID-xzbt-bkdp-8bgh
17
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.49%252Bdfsg-3
2
url pkg:deb/debian/bouncycastle@1.68-2?distro=trixie
purl pkg:deb/debian/bouncycastle@1.68-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2j9r-6zbp-m3bz
1
vulnerability VCID-4rs8-tp92-p7ck
2
vulnerability VCID-abxq-7eq3-g7dp
3
vulnerability VCID-d5x5-hcjh-efcr
4
vulnerability VCID-e4j2-7rmt-17bf
5
vulnerability VCID-rary-mqyu-2yes
6
vulnerability VCID-sz15-payv-uyab
7
vulnerability VCID-wqgc-hd9r-zuek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie
3
url pkg:deb/debian/bouncycastle@1.72-2?distro=trixie
purl pkg:deb/debian/bouncycastle@1.72-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2j9r-6zbp-m3bz
1
vulnerability VCID-4rs8-tp92-p7ck
2
vulnerability VCID-abxq-7eq3-g7dp
3
vulnerability VCID-d5x5-hcjh-efcr
4
vulnerability VCID-e4j2-7rmt-17bf
5
vulnerability VCID-rary-mqyu-2yes
6
vulnerability VCID-sz15-payv-uyab
7
vulnerability VCID-wqgc-hd9r-zuek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie
4
url pkg:deb/debian/bouncycastle@1.80-3?distro=trixie
purl pkg:deb/debian/bouncycastle@1.80-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie
5
url pkg:maven/org.bouncycastle/bcprov-jdk15on@1.48
purl pkg:maven/org.bouncycastle/bcprov-jdk15on@1.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2j9r-6zbp-m3bz
1
vulnerability VCID-2u8v-56gn-8uc2
2
vulnerability VCID-4rs8-tp92-p7ck
3
vulnerability VCID-ddqw-aj7g-s7c2
4
vulnerability VCID-f4qa-9fn6-97az
5
vulnerability VCID-f73y-mjrg-yfc9
6
vulnerability VCID-jr7u-m7gc-pydy
7
vulnerability VCID-jua2-2byr-t3cv
8
vulnerability VCID-ka8b-44hx-mkc5
9
vulnerability VCID-nau9-4auz-pqbs
10
vulnerability VCID-pybm-wf4t-pbdg
11
vulnerability VCID-qr8s-5r61-skhw
12
vulnerability VCID-tnen-a68v-9bfk
13
vulnerability VCID-w543-qxxs-f7g7
14
vulnerability VCID-waqt-x8vm-qyez
15
vulnerability VCID-xzbt-bkdp-8bgh
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.48
Affected_packages
0
url pkg:deb/debian/bouncycastle@1.33-4
purl pkg:deb/debian/bouncycastle@1.33-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-4kq8-fsqc-4qdn
3
vulnerability VCID-ahmw-gd8w-f7cd
4
vulnerability VCID-amzx-sbps-xke5
5
vulnerability VCID-b1m6-r1bv-d7gr
6
vulnerability VCID-crf9-zn1q-vya8
7
vulnerability VCID-ddqw-aj7g-s7c2
8
vulnerability VCID-e1yx-dxa6-1bba
9
vulnerability VCID-f4qa-9fn6-97az
10
vulnerability VCID-f73y-mjrg-yfc9
11
vulnerability VCID-jr7u-m7gc-pydy
12
vulnerability VCID-jua2-2byr-t3cv
13
vulnerability VCID-ka8b-44hx-mkc5
14
vulnerability VCID-nau9-4auz-pqbs
15
vulnerability VCID-pybm-wf4t-pbdg
16
vulnerability VCID-qr8s-5r61-skhw
17
vulnerability VCID-tnen-a68v-9bfk
18
vulnerability VCID-w543-qxxs-f7g7
19
vulnerability VCID-waqt-x8vm-qyez
20
vulnerability VCID-xpm3-yad2-mke2
21
vulnerability VCID-xzbt-bkdp-8bgh
22
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.33-4
1
url pkg:deb/debian/bouncycastle@1.39-2
purl pkg:deb/debian/bouncycastle@1.39-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-ahmw-gd8w-f7cd
3
vulnerability VCID-amzx-sbps-xke5
4
vulnerability VCID-b1m6-r1bv-d7gr
5
vulnerability VCID-crf9-zn1q-vya8
6
vulnerability VCID-ddqw-aj7g-s7c2
7
vulnerability VCID-e1yx-dxa6-1bba
8
vulnerability VCID-f4qa-9fn6-97az
9
vulnerability VCID-f73y-mjrg-yfc9
10
vulnerability VCID-jr7u-m7gc-pydy
11
vulnerability VCID-jua2-2byr-t3cv
12
vulnerability VCID-ka8b-44hx-mkc5
13
vulnerability VCID-nau9-4auz-pqbs
14
vulnerability VCID-pybm-wf4t-pbdg
15
vulnerability VCID-qr8s-5r61-skhw
16
vulnerability VCID-tnen-a68v-9bfk
17
vulnerability VCID-w543-qxxs-f7g7
18
vulnerability VCID-waqt-x8vm-qyez
19
vulnerability VCID-xpm3-yad2-mke2
20
vulnerability VCID-xzbt-bkdp-8bgh
21
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.39-2
2
url pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2
purl pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-ahmw-gd8w-f7cd
3
vulnerability VCID-amzx-sbps-xke5
4
vulnerability VCID-b1m6-r1bv-d7gr
5
vulnerability VCID-crf9-zn1q-vya8
6
vulnerability VCID-ddqw-aj7g-s7c2
7
vulnerability VCID-e1yx-dxa6-1bba
8
vulnerability VCID-f4qa-9fn6-97az
9
vulnerability VCID-f73y-mjrg-yfc9
10
vulnerability VCID-jr7u-m7gc-pydy
11
vulnerability VCID-jua2-2byr-t3cv
12
vulnerability VCID-ka8b-44hx-mkc5
13
vulnerability VCID-nau9-4auz-pqbs
14
vulnerability VCID-pybm-wf4t-pbdg
15
vulnerability VCID-qr8s-5r61-skhw
16
vulnerability VCID-tnen-a68v-9bfk
17
vulnerability VCID-w543-qxxs-f7g7
18
vulnerability VCID-waqt-x8vm-qyez
19
vulnerability VCID-xpm3-yad2-mke2
20
vulnerability VCID-xzbt-bkdp-8bgh
21
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-2
3
url pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2%2Bdeb6u1
purl pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-ahmw-gd8w-f7cd
3
vulnerability VCID-amzx-sbps-xke5
4
vulnerability VCID-b1m6-r1bv-d7gr
5
vulnerability VCID-crf9-zn1q-vya8
6
vulnerability VCID-ddqw-aj7g-s7c2
7
vulnerability VCID-e1yx-dxa6-1bba
8
vulnerability VCID-f4qa-9fn6-97az
9
vulnerability VCID-f73y-mjrg-yfc9
10
vulnerability VCID-jr7u-m7gc-pydy
11
vulnerability VCID-jua2-2byr-t3cv
12
vulnerability VCID-ka8b-44hx-mkc5
13
vulnerability VCID-nau9-4auz-pqbs
14
vulnerability VCID-pybm-wf4t-pbdg
15
vulnerability VCID-qr8s-5r61-skhw
16
vulnerability VCID-tnen-a68v-9bfk
17
vulnerability VCID-w543-qxxs-f7g7
18
vulnerability VCID-waqt-x8vm-qyez
19
vulnerability VCID-xpm3-yad2-mke2
20
vulnerability VCID-xzbt-bkdp-8bgh
21
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-2%252Bdeb6u1
4
url pkg:deb/debian/bouncycastle@1.44%2Bdfsg-3.1%2Bdeb7u1
purl pkg:deb/debian/bouncycastle@1.44%2Bdfsg-3.1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2u8v-56gn-8uc2
1
vulnerability VCID-31h9-7jrr-9kdt
2
vulnerability VCID-ahmw-gd8w-f7cd
3
vulnerability VCID-amzx-sbps-xke5
4
vulnerability VCID-b1m6-r1bv-d7gr
5
vulnerability VCID-crf9-zn1q-vya8
6
vulnerability VCID-ddqw-aj7g-s7c2
7
vulnerability VCID-e1yx-dxa6-1bba
8
vulnerability VCID-f4qa-9fn6-97az
9
vulnerability VCID-f73y-mjrg-yfc9
10
vulnerability VCID-jr7u-m7gc-pydy
11
vulnerability VCID-jua2-2byr-t3cv
12
vulnerability VCID-ka8b-44hx-mkc5
13
vulnerability VCID-nau9-4auz-pqbs
14
vulnerability VCID-pybm-wf4t-pbdg
15
vulnerability VCID-qr8s-5r61-skhw
16
vulnerability VCID-tnen-a68v-9bfk
17
vulnerability VCID-w543-qxxs-f7g7
18
vulnerability VCID-waqt-x8vm-qyez
19
vulnerability VCID-xpm3-yad2-mke2
20
vulnerability VCID-xzbt-bkdp-8bgh
21
vulnerability VCID-y7hr-kcfy-5qgd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-3.1%252Bdeb7u1
5
url pkg:maven/org.bouncycastle/bcprov-jdk15on@1.46
purl pkg:maven/org.bouncycastle/bcprov-jdk15on@1.46
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2j9r-6zbp-m3bz
1
vulnerability VCID-2u8v-56gn-8uc2
2
vulnerability VCID-4rs8-tp92-p7ck
3
vulnerability VCID-ahmw-gd8w-f7cd
4
vulnerability VCID-ddqw-aj7g-s7c2
5
vulnerability VCID-f4qa-9fn6-97az
6
vulnerability VCID-f73y-mjrg-yfc9
7
vulnerability VCID-jr7u-m7gc-pydy
8
vulnerability VCID-jua2-2byr-t3cv
9
vulnerability VCID-ka8b-44hx-mkc5
10
vulnerability VCID-nau9-4auz-pqbs
11
vulnerability VCID-pybm-wf4t-pbdg
12
vulnerability VCID-qr8s-5r61-skhw
13
vulnerability VCID-tnen-a68v-9bfk
14
vulnerability VCID-w543-qxxs-f7g7
15
vulnerability VCID-waqt-x8vm-qyez
16
vulnerability VCID-xzbt-bkdp-8bgh
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.46
6
url pkg:maven/org.bouncycastle/bcprov-jdk15on@1.47
purl pkg:maven/org.bouncycastle/bcprov-jdk15on@1.47
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2j9r-6zbp-m3bz
1
vulnerability VCID-2u8v-56gn-8uc2
2
vulnerability VCID-4rs8-tp92-p7ck
3
vulnerability VCID-ahmw-gd8w-f7cd
4
vulnerability VCID-ddqw-aj7g-s7c2
5
vulnerability VCID-f4qa-9fn6-97az
6
vulnerability VCID-f73y-mjrg-yfc9
7
vulnerability VCID-jr7u-m7gc-pydy
8
vulnerability VCID-jua2-2byr-t3cv
9
vulnerability VCID-ka8b-44hx-mkc5
10
vulnerability VCID-nau9-4auz-pqbs
11
vulnerability VCID-pybm-wf4t-pbdg
12
vulnerability VCID-qr8s-5r61-skhw
13
vulnerability VCID-tnen-a68v-9bfk
14
vulnerability VCID-w543-qxxs-f7g7
15
vulnerability VCID-waqt-x8vm-qyez
16
vulnerability VCID-xzbt-bkdp-8bgh
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.47
References
0
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2013/02/05/24
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-0371.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0371.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-0372.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0372.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1624.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1624
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59865
published_at 2026-04-16T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59777
published_at 2026-04-07T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59828
published_at 2026-04-08T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59842
published_at 2026-04-09T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59862
published_at 2026-04-11T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59846
published_at 2026-04-12T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59827
published_at 2026-04-13T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.5971
published_at 2026-04-01T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59783
published_at 2026-04-02T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59807
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624
6
reference_url http://secunia.com/advisories/57716
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/57716
7
reference_url http://secunia.com/advisories/57719
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/57719
8
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
reference_id 699885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=908428
reference_id 908428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=908428
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:0.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.6.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\#-cryptography-api:1.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1624
reference_id CVE-2013-1624
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-1624
68
reference_url https://github.com/advisories/GHSA-8353-fgcr-xfhx
reference_id GHSA-8353-fgcr-xfhx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8353-fgcr-xfhx
69
reference_url https://access.redhat.com/errata/RHSA-2014:0400
reference_id RHSA-2014:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0400
70
reference_url https://access.redhat.com/errata/RHSA-2014:0401
reference_id RHSA-2014:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0401
71
reference_url https://access.redhat.com/errata/RHSA-2014:0896
reference_id RHSA-2014:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0896
72
reference_url https://access.redhat.com/errata/RHSA-2015:1009
reference_id RHSA-2015:1009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1009
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 310
name Cryptographic Issues
description Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
4
cwe_id 385
name Covert Timing Channel
description Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ahmw-gd8w-f7cd