JavaScript & Node.js
Prototype pollution, ReDoS, insecure randomness, and malicious service workers — JavaScript-specific vulnerabilities.
4 vulnerabilities
Prototype Pollution
highMerging user-controlled objects without filtering lets attackers modify Object.prototype and affect every object in the application.
CWE-1321A03:2021
ReDoS (Regex Denial of Service)
mediumRegular expressions with nested quantifiers can take exponential time to evaluate certain inputs, freezing your Node.js event loop.
CWE-1333A05:2021
Insecure Randomness
highUsing Math.random() for security-sensitive values like tokens or IDs is predictable and can be brute-forced.
CWE-338A02:2021
Malicious Service Worker
mediumA service worker registered without scope restrictions can intercept all network requests for a domain, including those from other pages.
CWE-693A05:2021