Data HogoDataHogo
LearnFree ToolsBlogPricingSign in
Get Started
Back to all vulnerabilities

Cryptography

ECB mode, static IVs, weak key sizes, disabled certificate validation, weak PRNGs, JWT algorithm none attack, and hardcoded encryption keys.

7 vulnerabilities

ECB Mode

medium

Using ECB (Electronic Codebook) mode for encryption produces identical ciphertext blocks for identical plaintext blocks, revealing patterns in the encrypted data.

CWE-327A02:2021

Static IV/Nonce

high

Using a hardcoded or constant Initialization Vector (IV) or nonce for encryption defeats the purpose of the IV and allows attackers to detect patterns and decrypt data.

CWE-329A02:2021

Weak Key Size

medium

Using cryptographic keys shorter than recommended minimums (RSA less than 2048 bits, AES less than 128 bits) makes encryption vulnerable to brute-force attacks with modern hardware.

CWE-326A02:2021

Certificate Validation Disabled

critical

Disabling TLS certificate validation with NODE_TLS_REJECT_UNAUTHORIZED=0 or rejectUnauthorized: false allows man-in-the-middle attacks on all HTTPS connections.

CWE-295A07:2021

Weak PRNG for Security

high

Using Math.random() or Date.now() to generate tokens, session IDs, or reset codes produces predictable values that attackers can guess or reproduce.

CWE-338A02:2021

JWT Algorithm None

critical

Accepting 'none' as a valid JWT signing algorithm lets attackers forge tokens without a secret key.

CWE-327A02:2021

Hardcoded Encryption Key

high

Embedding encryption keys as string literals in code means anyone with repo access can decrypt your data.

CWE-321A02:2021
Data HogoDataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing
  • How Your Score Works

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.