org.webjars.npm:useragent@2.1.6 vulnerabilities
-
latest version
2.3.0
-
first published
9 years ago
-
latest version published
7 years ago
-
licenses detected
- [2.1.6,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:useragent package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.npm:useragent is an allows you to parse user agent string with high accuracy by using hand tuned dedicated regular expressions for browser matching. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expressions in the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for |
[0,)
|
org.webjars.npm:useragent allows you to parse user agent string with high accuracy by using hand tuned dedicated regular expressions for browser matching. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) when passing long user-agent strings. This is due to incomplete fix for this vulnerability: https://snyk.io/vuln/SNYK-JS-USERAGENT-11000. An attempt to fix the vulnerability has been pushed to master. How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for |
[0,)
|
Affected versions of the package are vulnerable to Regular Expression Denial of Service (ReDoS). How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,2.1.13)
|
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. A malicious user could cause the server to block by editing the request headers with an arbitrarily long useragent string. How to fix Regular Expression Denial of Service (ReDoS)? Update |
[,2.1.12)
|