Search for packages
Package details: pkg:maven/org.bouncycastle/bcprov-jdk15on@1.61
purl pkg:maven/org.bouncycastle/bcprov-jdk15on@1.61
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-3n8c-mcad-6ybm
Aliases:
CVE-2024-30172
GHSA-m44j-cfrm-g8qc
Bouncy Castle crafted signature and public key can be used to trigger an infinite loop An issue was discovered in Bouncy Castle Java Cryptography APIs starting in 1.73 and before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.
1.78
Affected by 0 other vulnerabilities.
VCID-cuv2-m4kt-hqba
Aliases:
CVE-2020-15522
GHSA-6xx3-rg99-gc3p
Timing based private key exposure in Bouncy Castle Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.2.1, BC before 1.66, BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
1.66
Affected by 5 other vulnerabilities.
VCID-f8vc-nspc-qyfj
Aliases:
CVE-2023-33201
GHSA-hr8g-6v94-x4m9
Bouncy Castle For Java LDAP injection vulnerability Bouncy Castle provides the `X509LDAPCertStoreSpi.java` class which can be used in conjunction with the CertPath API for validating certificate paths. Pre-1.73 the implementation did not check the X.500 name of any certificate, subject, or issuer being passed in for LDAP wild cards, meaning the presence of a wild car may lead to Information Disclosure. A potential attack would be to generate a self-signed certificate with a subject name that contains special characters, e.g: `CN=Subject*)(objectclass=`. This will be included into the filter and provides the attacker ability to specify additional attributes in the search query. This can be exploited as a blind LDAP injection: an attacker can enumerate valid attribute values using the boolean blind injection technique. The exploitation depends on the structure of the target LDAP directory, as well as what kind of errors are exposed to the user. Changes to the `X509LDAPCertStoreSpi.java` class add the additional checking of any X.500 name used to correctly escape wild card characters. There are no reported fixed by versions.
VCID-gr1b-m4u1-z7a3
Aliases:
CVE-2024-29857
GHSA-8xfc-gm6g-vgpv
Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
1.78
Affected by 0 other vulnerabilities.
VCID-t3ap-b4c1-byfr
Aliases:
CVE-2024-30171
GHSA-v435-xc8x-wvr9
Bouncy Castle affected by timing side-channel for RSA key exchange ("The Marvin Attack") An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
1.78
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-5p1s-8spz-juh2 Observable Differences in Behavior to Error Inputs in Bouncy Castle In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. CVE-2020-26939
GHSA-72m5-fvvv-55m6

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T13:37:29.314024+00:00 GHSA Importer Fixing VCID-5p1s-8spz-juh2 https://github.com/advisories/GHSA-72m5-fvvv-55m6 37.0.0
2025-08-01T11:43:27.668032+00:00 GitLab Importer Affected by VCID-t3ap-b4c1-byfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2024-30171.yml 37.0.0
2025-08-01T11:43:17.019024+00:00 GitLab Importer Affected by VCID-gr1b-m4u1-z7a3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2024-29857.yml 37.0.0
2025-08-01T11:43:11.180613+00:00 GitLab Importer Affected by VCID-3n8c-mcad-6ybm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2024-30172.yml 37.0.0
2025-08-01T11:13:36.820487+00:00 GitLab Importer Affected by VCID-f8vc-nspc-qyfj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2023-33201.yml 37.0.0
2025-08-01T10:00:24.025391+00:00 GitLab Importer Affected by VCID-cuv2-m4kt-hqba https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2020-15522.yml 37.0.0
2025-08-01T09:52:34.848179+00:00 GitLab Importer Fixing VCID-5p1s-8spz-juh2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.bouncycastle/bcprov-jdk15on/CVE-2020-26939.yml 37.0.0
2025-07-31T08:49:07.400984+00:00 GithubOSV Importer Fixing VCID-5p1s-8spz-juh2 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-72m5-fvvv-55m6/GHSA-72m5-fvvv-55m6.json 37.0.0