A poor development practice was discovered due to the presence of specific function or
variable name in the remote Adobe Flash application. These are examples of what's identified
by the vulnerability check:
- Usage of the insecure "md5" hashing algorithm to hash usernames or passwords.
- Usage of obfuscation mechanisms.