Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #871

Closed
Open
Created Sep 13, 2022 by Administrator@rootMaintainer

jruby-complete-1.7.21.jar: bcprov-jdk15on-1.50.jar|CVE-2017-13098

Created by: armorcodegithubqa[bot]

BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT." Vulnerable Software: cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api::::::::

File Path: \Profiles\ptrovatelli.m2\repository\org\jruby\jruby-complete\1.7.21\jruby-complete-1.7.21.jar\META-INF\jruby.home\lib\ruby\shared\org\bouncycastle\bcprov-jdk15on\1.50\bcprov-jdk15on-1.50.jar

https://qa.armorcode.ai/#/findings/12479968

Assignee
Assign to
Time tracking