CVE-2022-29249

JavaEZ is a library that adds new functions to make Java easier. A weakness in JavaEZ 1.6 allows force decryption of locked text by unauthorized actors. The issue is NOT critical for non-secure applications, however may be critical in a situation where the highest levels of security are required. This issue ONLY affects v1.6 and does not affect anything pre-1.6. The vulnerability has been patched in release 1.7. Currently, there is no way to fix the issue without upgrading.
Configurations

Configuration 1 (hide)

cpe:2.3:a:javaez_project:javaez:1.6:*:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
References () https://github.com/JavaEZLib/JavaEZ/releases/tag/1.7 - Release Notes, Third Party Advisory () https://github.com/JavaEZLib/JavaEZ/releases/tag/1.7 - Release Notes, Third Party Advisory
References () https://github.com/JavaEZLib/JavaEZ/security/advisories/GHSA-67fj-6w6m-w5j8 - Third Party Advisory () https://github.com/JavaEZLib/JavaEZ/security/advisories/GHSA-67fj-6w6m-w5j8 - Third Party Advisory

21 Jul 2023, 16:54

Type Values Removed Values Added
CWE CWE-328 CWE-326

Information

Published : 2022-05-24 16:15

Updated : 2024-11-21 06:58


NVD link : CVE-2022-29249

Mitre link : CVE-2022-29249

CVE.ORG link : CVE-2022-29249


JSON object : View

Products Affected

javaez_project

  • javaez
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-328

Use of Weak Hash

CWE-326

Inadequate Encryption Strength