Lookup for vulnerable packages by Package URL.

Purlpkg:npm/braces@3.0.2
Typenpm
Namespace
Namebraces
Version3.0.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.0.3
Latest_non_vulnerable_version3.0.3
Affected_by_vulnerabilities
0
url VCID-mssa-dgz3-w7fh
vulnerability_id VCID-mssa-dgz3-w7fh
summary
Uncontrolled resource consumption in braces
The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-18T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45248
published_at 2026-04-16T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45196
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-12T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45226
published_at 2026-04-11T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45205
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45186
published_at 2026-04-02T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
3
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/micromatch/braces
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces
6
reference_url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
7
reference_url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
8
reference_url https://github.com/micromatch/braces/issues/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/issues/35
9
reference_url https://github.com/micromatch/braces/pull/37
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/37
10
reference_url https://github.com/micromatch/braces/pull/40
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/40
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
reference_id 1071632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
reference_id 2280600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
14
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
reference_id CVE-2024-4068
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
15
reference_url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
reference_id GHSA-grv7-fg5c-xmjg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
16
reference_url https://access.redhat.com/errata/RHSA-2024:4464
reference_id RHSA-2024:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4464
17
reference_url https://access.redhat.com/errata/RHSA-2024:6211
reference_id RHSA-2024:6211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6211
fixed_packages
0
url pkg:npm/braces@3.0.3
purl pkg:npm/braces@3.0.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/braces@3.0.3
aliases CVE-2024-4068, GHSA-grv7-fg5c-xmjg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mssa-dgz3-w7fh
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/braces@3.0.2