Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3
Typedeb
Namespacedebian
Namenode-ua-parser-js
Version0.8.1+ds+~0.7.36-3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-jzj3-ddrr-u7hd
vulnerability_id VCID-jzj3-ddrr-u7hd
summary
ReDoS Vulnerability in ua-parser-js version
### Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`.

### Impact:
This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.

### Affected Versions:
From version `0.7.30` to before versions `0.7.33` / `1.0.33`.

### Patches:
A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later.

### References:
[Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)

### Credits:
Thanks to @Snyk who first reported the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25927.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25927
reference_id
reference_type
scores
0
value 0.01453
scoring_system epss
scoring_elements 0.80801
published_at 2026-04-12T12:55:00Z
1
value 0.01453
scoring_system epss
scoring_elements 0.80833
published_at 2026-04-18T12:55:00Z
2
value 0.01453
scoring_system epss
scoring_elements 0.8083
published_at 2026-04-16T12:55:00Z
3
value 0.01453
scoring_system epss
scoring_elements 0.80793
published_at 2026-04-13T12:55:00Z
4
value 0.01453
scoring_system epss
scoring_elements 0.808
published_at 2026-04-09T12:55:00Z
5
value 0.01453
scoring_system epss
scoring_elements 0.80816
published_at 2026-04-11T12:55:00Z
6
value 0.01453
scoring_system epss
scoring_elements 0.80791
published_at 2026-04-08T12:55:00Z
7
value 0.01493
scoring_system epss
scoring_elements 0.81034
published_at 2026-04-07T12:55:00Z
8
value 0.01493
scoring_system epss
scoring_elements 0.81102
published_at 2026-04-21T12:55:00Z
9
value 0.01803
scoring_system epss
scoring_elements 0.82772
published_at 2026-04-04T12:55:00Z
10
value 0.01803
scoring_system epss
scoring_elements 0.82758
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25927
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25927
3
reference_url https://github.com/faisalman/ua-parser-js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/faisalman/ua-parser-js
4
reference_url https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:27:15Z/
url https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411
5
reference_url https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:27:15Z/
url https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165020
reference_id 2165020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165020
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-25927
reference_id CVE-2022-25927
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-25927
8
reference_url https://github.com/advisories/GHSA-fhg7-m89q-25r3
reference_id GHSA-fhg7-m89q-25r3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fhg7-m89q-25r3
9
reference_url https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3
reference_id GHSA-fhg7-m89q-25r3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3
10
reference_url https://access.redhat.com/errata/RHSA-2023:1428
reference_id RHSA-2023:1428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1428
fixed_packages
0
url pkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3
purl pkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ua-parser-js@0.8.1%252Bds%252B~0.7.36-3
aliases CVE-2022-25927, GHSA-fhg7-m89q-25r3, GMS-2023-120
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzj3-ddrr-u7hd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ua-parser-js@0.8.1%252Bds%252B~0.7.36-3