Lookup for vulnerable packages by Package URL.

Purlpkg:npm/braces@1.8.0
Typenpm
Namespace
Namebraces
Version1.8.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.0.3
Latest_non_vulnerable_version3.0.3
Affected_by_vulnerabilities
0
url VCID-2386-f4qn-sbfx
vulnerability_id VCID-2386-f4qn-sbfx
summary
Regular Expression Denial of Service
Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
references
0
reference_url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
reference_id
reference_type
scores
url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
1
reference_url https://www.npmjs.com/advisories/786
reference_id
reference_type
scores
url https://www.npmjs.com/advisories/786
fixed_packages
0
url pkg:npm/braces@2.3.1
purl pkg:npm/braces@2.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mssa-dgz3-w7fh
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/braces@2.3.1
aliases GMS-2019-5
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2386-f4qn-sbfx
1
url VCID-mssa-dgz3-w7fh
vulnerability_id VCID-mssa-dgz3-w7fh
summary
Uncontrolled resource consumption in braces
The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-18T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45248
published_at 2026-04-16T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45196
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-12T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45226
published_at 2026-04-11T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45205
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45186
published_at 2026-04-02T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
3
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/micromatch/braces
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces
6
reference_url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
7
reference_url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
8
reference_url https://github.com/micromatch/braces/issues/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/issues/35
9
reference_url https://github.com/micromatch/braces/pull/37
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/37
10
reference_url https://github.com/micromatch/braces/pull/40
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/40
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
reference_id 1071632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
reference_id 2280600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
14
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
reference_id CVE-2024-4068
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
15
reference_url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
reference_id GHSA-grv7-fg5c-xmjg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
16
reference_url https://access.redhat.com/errata/RHSA-2024:4464
reference_id RHSA-2024:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4464
17
reference_url https://access.redhat.com/errata/RHSA-2024:6211
reference_id RHSA-2024:6211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6211
fixed_packages
0
url pkg:npm/braces@3.0.3
purl pkg:npm/braces@3.0.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/braces@3.0.3
aliases CVE-2024-4068, GHSA-grv7-fg5c-xmjg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mssa-dgz3-w7fh
2
url VCID-ynup-8rhy-fbdz
vulnerability_id VCID-ynup-8rhy-fbdz
summary
Duplicate Advisory: Regular Expression Denial of Service in braces
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-cwfw-4gq5-mrqx. This link is maintained to preserve external references.

## Original Description
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.


## Recommendation

Upgrade to version 2.3.1 or higher.
references
0
reference_url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
1
reference_url https://snyk.io/vuln/npm:braces:20180219
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/npm:braces:20180219
2
reference_url https://www.npmjs.com/advisories/786
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/786
3
reference_url https://github.com/advisories/GHSA-g95f-p29q-9xw4
reference_id GHSA-g95f-p29q-9xw4
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g95f-p29q-9xw4
fixed_packages
0
url pkg:npm/braces@2.3.1
purl pkg:npm/braces@2.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mssa-dgz3-w7fh
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/braces@2.3.1
aliases GHSA-g95f-p29q-9xw4, GMS-2019-117
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynup-8rhy-fbdz
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/braces@1.8.0