Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Insufficient Isolation of Symbolic Constant Definitions

The source code uses symbolic constants, but it does notn sufficiently place the definitions of these constants into a more centralized orn isolated location.