PL or SQL : Weak obfuscation (wrapping)
Classification
OWASP Top 10 2013 A9-Using Components with Known Vulnerabilities OWASP Top 10 2017 A9-Using Components with Known Vulnerabilities OWASP Top 10 2021 A6-Vulnerable and Outdated Components CWE CWE-1035Overview
The application uses wrapping - built-in tool for obfuscation PL/SQL code. This algorithm is not secure and can be reversed using publicly available tools.