{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15835?format=json","vulnerability_id":"VCID-ahmw-gd8w-f7cd","summary":"Improper Input Validation in Bouncy Castle\nThe TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.","aliases":[{"alias":"CVE-2013-1624"},{"alias":"GHSA-8353-fgcr-xfhx"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586607?format=json","purl":"pkg:deb/debian/bouncycastle@1.48%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.48%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1036784?format=json","purl":"pkg:deb/debian/bouncycastle@1.49%2Bdfsg-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.49%252Bdfsg-3"},{"url":"http://public2.vulnerablecode.io/api/packages/582146?format=json","purl":"pkg:deb/debian/bouncycastle@1.68-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9r-6zbp-m3bz"},{"vulnerability":"VCID-4rs8-tp92-p7ck"},{"vulnerability":"VCID-abxq-7eq3-g7dp"},{"vulnerability":"VCID-d5x5-hcjh-efcr"},{"vulnerability":"VCID-e4j2-7rmt-17bf"},{"vulnerability":"VCID-rary-mqyu-2yes"},{"vulnerability":"VCID-sz15-payv-uyab"},{"vulnerability":"VCID-wqgc-hd9r-zuek"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582147?format=json","purl":"pkg:deb/debian/bouncycastle@1.72-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9r-6zbp-m3bz"},{"vulnerability":"VCID-37ce-hamd-wuda"},{"vulnerability":"VCID-4rs8-tp92-p7ck"},{"vulnerability":"VCID-abxq-7eq3-g7dp"},{"vulnerability":"VCID-d5x5-hcjh-efcr"},{"vulnerability":"VCID-e4j2-7rmt-17bf"},{"vulnerability":"VCID-rary-mqyu-2yes"},{"vulnerability":"VCID-sz15-payv-uyab"},{"vulnerability":"VCID-wqgc-hd9r-zuek"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582148?format=json","purl":"pkg:deb/debian/bouncycastle@1.80-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-37ce-hamd-wuda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/55095?format=json","purl":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.48","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9r-6zbp-m3bz"},{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-4rs8-tp92-p7ck"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.48"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571257?format=json","purl":"pkg:deb/debian/bouncycastle@1.33-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-4kq8-fsqc-4qdn"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-b1m6-r1bv-d7gr"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.33-4"},{"url":"http://public2.vulnerablecode.io/api/packages/571258?format=json","purl":"pkg:deb/debian/bouncycastle@1.39-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-b1m6-r1bv-d7gr"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.39-2"},{"url":"http://public2.vulnerablecode.io/api/packages/571259?format=json","purl":"pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-b1m6-r1bv-d7gr"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-2"},{"url":"http://public2.vulnerablecode.io/api/packages/571260?format=json","purl":"pkg:deb/debian/bouncycastle@1.44%2Bdfsg-2%2Bdeb6u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-b1m6-r1bv-d7gr"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-2%252Bdeb6u1"},{"url":"http://public2.vulnerablecode.io/api/packages/571261?format=json","purl":"pkg:deb/debian/bouncycastle@1.44%2Bdfsg-3.1%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-31h9-7jrr-9kdt"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-amzx-sbps-xke5"},{"vulnerability":"VCID-b1m6-r1bv-d7gr"},{"vulnerability":"VCID-crf9-zn1q-vya8"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xpm3-yad2-mke2"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"},{"vulnerability":"VCID-y7hr-kcfy-5qgd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.44%252Bdfsg-3.1%252Bdeb7u1"},{"url":"http://public2.vulnerablecode.io/api/packages/178176?format=json","purl":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.46","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9r-6zbp-m3bz"},{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-4rs8-tp92-p7ck"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.46"},{"url":"http://public2.vulnerablecode.io/api/packages/178177?format=json","purl":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.47","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9r-6zbp-m3bz"},{"vulnerability":"VCID-2u8v-56gn-8uc2"},{"vulnerability":"VCID-4rs8-tp92-p7ck"},{"vulnerability":"VCID-ahmw-gd8w-f7cd"},{"vulnerability":"VCID-ddqw-aj7g-s7c2"},{"vulnerability":"VCID-f4qa-9fn6-97az"},{"vulnerability":"VCID-f73y-mjrg-yfc9"},{"vulnerability":"VCID-jr7u-m7gc-pydy"},{"vulnerability":"VCID-jua2-2byr-t3cv"},{"vulnerability":"VCID-ka8b-44hx-mkc5"},{"vulnerability":"VCID-nau9-4auz-pqbs"},{"vulnerability":"VCID-pybm-wf4t-pbdg"},{"vulnerability":"VCID-qr8s-5r61-skhw"},{"vulnerability":"VCID-tnen-a68v-9bfk"},{"vulnerability":"VCID-w543-qxxs-f7g7"},{"vulnerability":"VCID-waqt-x8vm-qyez"},{"vulnerability":"VCID-xzbt-bkdp-8bgh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.47"}],"references":[{"reference_url":"http://openwall.com/lists/oss-security/2013/02/05/24","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://openwall.com/lists/oss-security/2013/02/05/24"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1624.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1624","reference_id":"","reference_type":"","scores":[{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59948","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59793","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5984","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59899","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59856","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59828","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59827","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59857","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59845","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624"},{"reference_url":"http://secunia.com/advisories/57716","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/57716"},{"reference_url":"http://secunia.com/advisories/57719","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/57719"},{"reference_url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885","reference_id":"699885","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=908428","reference_id":"908428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=908428"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:1.47:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1624","reference_id":"CVE-2013-1624","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1624"},{"reference_url":"https://github.com/advisories/GHSA-8353-fgcr-xfhx","reference_id":"GHSA-8353-fgcr-xfhx","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8353-fgcr-xfhx"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0400","reference_id":"RHSA-2014:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0401","reference_id":"RHSA-2014:0401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0896","reference_id":"RHSA-2014:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1009","reference_id":"RHSA-2015:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1009"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":310,"name":"Cryptographic Issues","description":"Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."},{"cwe_id":385,"name":"Covert Timing Channel","description":"Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahmw-gd8w-f7cd"}