Closed mend-for-github-com[bot] closed 2 years ago
Fastest, most accurate & effecient user agent string parser, uses Browserscope's research for parsing
Library home page: https://registry.npmjs.org/useragent/-/useragent-2.2.1.tgz
Path to dependency file: videojs-dock/package.json
Path to vulnerable library: videojs-dock/node_modules/useragent/package.json
Dependency Hierarchy: - karma-3.0.0.tgz (Root Library) - :x: **useragent-2.2.1.tgz** (Vulnerable Library)
Found in HEAD commit: 94e6200be9ecc48ffad7dd009fa94bbfc47f0391
Found in base branch: main
Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0.
Publish Date: 2018-02-27
URL: WS-2018-0650
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
WS-2018-0650 - High Severity Vulnerability
Vulnerable Library - useragent-2.2.1.tgz
Fastest, most accurate & effecient user agent string parser, uses Browserscope's research for parsing
Library home page: https://registry.npmjs.org/useragent/-/useragent-2.2.1.tgz
Path to dependency file: videojs-dock/package.json
Path to vulnerable library: videojs-dock/node_modules/useragent/package.json
Dependency Hierarchy: - karma-3.0.0.tgz (Root Library) - :x: **useragent-2.2.1.tgz** (Vulnerable Library)
Found in HEAD commit: 94e6200be9ecc48ffad7dd009fa94bbfc47f0391
Found in base branch: main
Vulnerability Details
Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0.
Publish Date: 2018-02-27
URL: WS-2018-0650
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.