Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Insufficient Use of Symbolic Constants

The source code uses literal constants that may need to changen or evolve over time, instead of using symbolic constants.