保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

JavaScript & Node.js

Prototype pollution, ReDoS, insecure randomness, and malicious service workers — JavaScript-specific vulnerabilities.

4 vulnerabilities

Prototype Pollution

high

Merging user-controlled objects without filtering lets attackers modify Object.prototype and affect every object in the application.

CWE-1321A03:2021

ReDoS (Regex Denial of Service)

medium

Regular expressions with nested quantifiers can take exponential time to evaluate certain inputs, freezing your Node.js event loop.

CWE-1333A05:2021

Insecure Randomness

high

Using Math.random() for security-sensitive values like tokens or IDs is predictable and can be brute-forced.

CWE-338A02:2021

Malicious Service Worker

medium

A service worker registered without scope restrictions can intercept all network requests for a domain, including those from other pages.

CWE-693A05:2021
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.