ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{ "nvd_published_at": "2021-03-17T13:15:00Z", "github_reviewed_at": "2021-03-22T20:23:57Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-400" ] }