ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{
"github_reviewed": true,
"github_reviewed_at": "2021-03-22T20:23:57Z",
"nvd_published_at": "2021-03-17T13:15:00Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-400"
]
}