Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Hard-coded Cryptographic Key

Using of hard-coded cryptographic key for encrypting the information increases possibility of remote hackers to get access to information.
The weakness is introduced during Architecture and Design stage.