CWE: 327 (Use of a Broken or Risky Cryptographic Algorithm)
This function uses the MD5() function, which uses a hash algorithm that is considered weak. In recent years, researchers have demonstrated ways to breach many uses of previously-thought-safe hash functions such as MD5. Consider using a stronger algorithm in order to prevent attackers from being able to manipulate hash results. If this algorithm is being used to hash passwords, then consider using a strong computationally-hard algorithm such as PBKDF2 or bcrypt instead of a plain hashing algorithm.References: CWE/nDon't know how to fix this? Don't know why this was reported? Get Assistance from Veracode
https://github.com/release-0-2-0/vulnado/blob/122294b91e69a2140caa995465c0ffb21e5443da/src/main/java/com/scalesec/vulnado/Postgres.java#L62-L72
Filename: com/scalesec/vulnado/Postgres.java
Line: 67
CWE: 327 (Use of a Broken or Risky Cryptographic Algorithm)
This function uses the MD5() function, which uses a hash algorithm that is considered weak. In recent years, researchers have demonstrated ways to breach many uses of previously-thought-safe hash functions such as MD5. Consider using a stronger algorithm in order to prevent attackers from being able to manipulate hash results. If this algorithm is being used to hash passwords, then consider using a strong computationally-hard algorithm such as PBKDF2 or bcrypt instead of a plain hashing algorithm. References: CWE/nDon't know how to fix this? Don't know why this was reported?
Get Assistance from Veracode