logo

Database

Description

Insecure algorithms such as Blowfish are used to encrypt the information stored in the code.

Impact

Decrypt the credentials that are stored encrypted with blowfish.

Recommendation

Use secure algorithms such as AES or RSA.

Threat

Unauthorized user with access to the code.

Expected Remediation Time

⏱️ 30 minutes.