In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.bouncycastle:bcprov-jdk18on
to version 1.78 or higher.
This was deemed not a vulnerability.
Affected versions of this package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher
exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.
Note:
This advisory was revoked as it is a duplicate of https://security.snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-6613076