Vulnerability

Code Rules in Vulnerability category

Category Severity Name Description
Vulnerability Critical DES or 3DES Used Neither DES (Data Encryption Standard) nor DESede (3DES) should be used
Vulnerability Critical Exceptions should not be ignored Exceptions should not be ignored
Vulnerability Critical Sensitive SYS owned functions should not be used Sensitive SYS owned functions should not be used
Vulnerability Critical SHA-1 and Message-Digest hash algorithms should not be used in secure contexts SHA-1 and Message-Digest hash algorithms should not be used in secure contexts