cvelist/2024/29xxx/CVE-2024-29857.json

62 lines
1.8 KiB
JSON
Raw Normal View History

2024-04-02 14:13:23 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2024-05-09 05:00:33 +00:00
"ID": "CVE-2024-29857",
"STATE": "PUBLIC"
2024-04-02 14:13:23 +00:00
},
2024-05-09 05:00:33 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2024-04-02 14:13:23 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2024-05-09 05:00:33 +00:00
"value": "An issue was discovered in Bouncy Castle Java Cryptography APIs before BC 1.78. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.bouncycastle.org/latest_releases.html",
"url": "https://www.bouncycastle.org/latest_releases.html"
2024-04-02 14:13:23 +00:00
}
]
}
}