Usage of Weak Hashing library (MD5)
Last updated
Last updated
Rule ID: java_lang_weak_hash_md5
Applicable Languages: Java
Weakness ID: CWE-328
Using a weak hashing algorithm such as MD5 heightens the risk of data breaches. MD5 is susceptible to collision attacks, where different inputs generate the same hash, undermining data integrity and security.
Do not use MD5 for hashing purposes. This algorithm is no longer considered secure and can compromise data integrity.
Do opt for stronger hashing algorithms like SHA-256 to ensure data security.
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our