Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3?distro=trixie
purl pkg:deb/debian/node-ua-parser-js@0.8.1%2Bds%2B~0.7.36-3?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-6c98-q4en-3uek ua-parser-js Regular Expression Denial of Service vulnerability The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). CVE-2020-7793
GHSA-394c-5j6w-4xmx
VCID-dmh1-fut8-2ygz Embedded malware in ua-parser-js The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. CVE-2021-4229
GHSA-pjwm-rvh2-c87w
GMS-2021-1
VCID-j1g9-gab7-cbch Regular Expression Denial of Service (ReDoS) in ua-parser-js ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. CVE-2021-27292
GHSA-78cj-fxph-m83p
VCID-jzj3-ddrr-u7hd ReDoS Vulnerability in ua-parser-js version ### Description: A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`. ### Impact: This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition. ### Affected Versions: From version `0.7.30` to before versions `0.7.33` / `1.0.33`. ### Patches: A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later. ### References: [Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) ### Credits: Thanks to @Snyk who first reported the issue. CVE-2022-25927
GHSA-fhg7-m89q-25r3
GMS-2023-120
VCID-q32y-yvrx-wkby Regular Expression Denial of Service in ua-parser-js The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. CVE-2020-7733
GHSA-662x-fhqg-9p8v

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:07:15.081408+00:00 Debian Importer Fixing VCID-q32y-yvrx-wkby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:00.157324+00:00 Debian Importer Fixing VCID-j1g9-gab7-cbch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:40.943221+00:00 Debian Importer Fixing VCID-dmh1-fut8-2ygz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:28.262175+00:00 Debian Importer Fixing VCID-6c98-q4en-3uek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:17:15.103671+00:00 Debian Importer Fixing VCID-q32y-yvrx-wkby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:46.075421+00:00 Debian Importer Fixing VCID-j1g9-gab7-cbch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:48.235204+00:00 Debian Importer Fixing VCID-dmh1-fut8-2ygz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:59.469497+00:00 Debian Importer Fixing VCID-6c98-q4en-3uek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:47:17.471231+00:00 Debian Importer Fixing VCID-jzj3-ddrr-u7hd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:17.439614+00:00 Debian Importer Fixing VCID-dmh1-fut8-2ygz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:17.417571+00:00 Debian Importer Fixing VCID-j1g9-gab7-cbch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:17.384469+00:00 Debian Importer Fixing VCID-6c98-q4en-3uek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:17.353393+00:00 Debian Importer Fixing VCID-q32y-yvrx-wkby https://security-tracker.debian.org/tracker/data/json 38.1.0