Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability: ua-parser-0.7.21.js #120

Open
tdashworth opened this issue Jul 4, 2022 · 0 comments
Open

Vulnerability: ua-parser-0.7.21.js #120

tdashworth opened this issue Jul 4, 2022 · 0 comments

Comments

@tdashworth
Copy link
Contributor

Vulnerability Library Description Top Fix Exists In Build Definitions
High7.5CVE-2020-7733Sep-16-2020 ua-parser-0.7.21.js The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. Upgrade to version 0.7.22https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733 Capgemini.PowerApps.SpecFlowBindings, Capgemini.PowerApps.SpecFlowBindings PR
High7.5CVE-2020-7793Dec-11-2020 ua-parser-0.7.21.js The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). Upgrade to version 0.7.23faisalman/ua-parser-js@6d1f26d Capgemini.PowerApps.SpecFlowBindings, Capgemini.PowerApps.SpecFlowBindings PR
High7.5CVE-2021-27292Mar-17-2021 ua-parser-0.7.21.js ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. Upgrade to version ua-parser-js - 0.7.24https://github.com/faisalman/ua-parser-js/releases/tag/0.7.24 Capgemini.PowerApps.SpecFlowBindings, Capgemini.PowerApps.SpecFlowBindings PR
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant