Use of a broken or risky cryptographic algorithm in...
Low severity
Unreviewed
Published
Jul 8, 2025
to the GitHub Advisory Database
•
Updated Jul 8, 2025
Description
Published by the National Vulnerability Database
Jul 8, 2025
Published to the GitHub Advisory Database
Jul 8, 2025
Last updated
Jul 8, 2025
Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized attacker to bypass a security feature locally.
References