I also was going to point out that these are probably [at least] three different concepts:
1. There are untrusted / revoked / distrusted root and/or intermediate CERTIFICATES.
2. There are KEYS which have been COMPROMISED (known/published/demonstrated public -> private key mapping) which are unsuitable for any use in any certificate in the WebPKI.
3. There are KEYS which are algorithmically WEAK and are unsuitable for any use in any certificate in the WebPKI.
Of the latter two, there is much overlap as researchers have published some lists of instances of the third case as specific examples, which makes them also fit in the 2nd case.
Importantly, it is likely that the person asking the question likely needs to separately consider certificates which are unknown/untrusted/revoked and keys which are bad for one of a number of reasons.