Количество 6
Количество 6
CVE-2016-1000346
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
CVE-2016-1000346
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
CVE-2016-1000346
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
CVE-2016-1000346
In the Bouncy Castle JCE Provider version 1.55 and earlier the other p ...
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
openSUSE-SU-2018:1689-1
Security update for bouncycastle
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-1000346 In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. | CVSS3: 3.7 | 1% Низкий | больше 7 лет назад | |
CVE-2016-1000346 In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. | CVSS3: 4.8 | 1% Низкий | больше 9 лет назад | |
CVE-2016-1000346 In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. | CVSS3: 3.7 | 1% Низкий | больше 7 лет назад | |
CVE-2016-1000346 In the Bouncy Castle JCE Provider version 1.55 and earlier the other p ... | CVSS3: 3.7 | 1% Низкий | больше 7 лет назад | |
GHSA-fjqm-246c-mwqg In Bouncy Castle JCE Provider the other party DH public key is not fully validated | CVSS3: 3.7 | 1% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:1689-1 Security update for bouncycastle | больше 7 лет назад |
Уязвимостей на страницу