The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf | Third Party Advisory |
https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599 | Exploit Third Party Advisory |
Configurations
History
13 Sep 2022, 21:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* |
|
References |
|
|
CWE | NVD-CWE-Other |
Information
Published : 2020-12-11 14:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-7793
Mitre link : CVE-2020-7793
CVE.ORG link : CVE-2020-7793
JSON object : View
Products Affected
ua-parser-js_project
- ua-parser-js
siemens
- sinec_ins
CWE