2 results (0.023 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function. Las versiones del paquete ua-parser-js desde 0.7.30 y anteriores a 0.7.33, desde 0.8.1 y anteriores a 1.0.33 son vulnerables a la denegación de servicio de expresión regular (ReDoS) a través de la función trim(). A flaw was found in ua-parser-js. This issue could allow a malicious user to trigger a regular expression denial of service (ReDoS) via the trim() function. • https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411 https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450 https://access.redhat.com/security/cve/CVE-2022-25927 https://bugzilla.redhat.com/show_bug.cgi?id=2165020 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

A vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component. • https://github.com/advisories/GHSA-pjwm-rvh2-c87w https://github.com/faisalman/ua-parser-js/issues/536 https://vuldb.com/?id.185453 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere CWE-912: Hidden Functionality •