Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | node-ua-parser-js |
| Version | 0.8.1+ds+~0.7.36-3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-6c98-q4en-3uek |
| vulnerability_id |
VCID-6c98-q4en-3uek |
| summary |
ua-parser-js Regular Expression Denial of Service vulnerability
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7793 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85745 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85752 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85747 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85729 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85733 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85654 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85721 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.8571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85691 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.02644 |
| scoring_system |
epss |
| scoring_elements |
0.85737 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7793 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7793, GHSA-394c-5j6w-4xmx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6c98-q4en-3uek |
|
| 1 |
| url |
VCID-dmh1-fut8-2ygz |
| vulnerability_id |
VCID-dmh1-fut8-2ygz |
| summary |
Embedded malware in ua-parser-js
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75039 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.7511 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.7512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75075 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75034 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75063 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75031 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4229 |
|
| 1 |
|
| 2 |
| reference_url |
https://github.com/faisalman/ua-parser-js/issues/536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:14:48Z/ |
|
|
| url |
https://github.com/faisalman/ua-parser-js/issues/536 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4229, GHSA-pjwm-rvh2-c87w, GMS-2021-1
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dmh1-fut8-2ygz |
|
| 2 |
| url |
VCID-j1g9-gab7-cbch |
| vulnerability_id |
VCID-j1g9-gab7-cbch |
| summary |
Regular Expression Denial of Service (ReDoS) in ua-parser-js
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27292 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50158 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50114 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50117 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50144 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50133 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50079 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50126 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50101 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27292 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-27292, GHSA-78cj-fxph-m83p
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j1g9-gab7-cbch |
|
| 3 |
| url |
VCID-jzj3-ddrr-u7hd |
| vulnerability_id |
VCID-jzj3-ddrr-u7hd |
| summary |
ReDoS Vulnerability in ua-parser-js version
### Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`.
### Impact:
This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.
### Affected Versions:
From version `0.7.30` to before versions `0.7.33` / `1.0.33`.
### Patches:
A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later.
### References:
[Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
### Credits:
Thanks to @Snyk who first reported the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80801 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.8083 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80793 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81034 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82758 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25927 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25927, GHSA-fhg7-m89q-25r3, GMS-2023-120
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jzj3-ddrr-u7hd |
|
| 4 |
| url |
VCID-q32y-yvrx-wkby |
| vulnerability_id |
VCID-q32y-yvrx-wkby |
| summary |
Regular Expression Denial of Service in ua-parser-js
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78908 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78838 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78845 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78856 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78911 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78913 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7733 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7733, GHSA-662x-fhqg-9p8v
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q32y-yvrx-wkby |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ua-parser-js@0.8.1%252Bds%252B~0.7.36-3%3Fdistro=trixie |