First published: Fri Dec 11 2020(Updated: )
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Ua-parser-js Project Ua-parser-js | <0.7.23 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-7793.
The severity of CVE-2020-7793 is high with a severity value of 7.5.
The affected software packages are ua-parser-js before version 0.7.23 and Siemens Sinec Ins version 1.0 and 1.0-sp1.
The vulnerability in ua-parser-js is a Regular Expression Denial of Service (ReDoS) in multiple regexes.
You can find more information about CVE-2020-7793 in the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf), [Reference 2](https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18), [Reference 3](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388).