Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-braces@3.0.2%2B~3.0.0-1?distro=trixie
Typedeb
Namespacedebian
Namenode-braces
Version3.0.2+~3.0.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.0.3+~3.0.4-1
Latest_non_vulnerable_version3.0.3+~3.0.5-1
Affected_by_vulnerabilities
0
url VCID-mssa-dgz3-w7fh
vulnerability_id VCID-mssa-dgz3-w7fh
summary
Uncontrolled resource consumption in braces
The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42318
published_at 2026-04-21T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45248
published_at 2026-04-16T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45196
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-12T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45226
published_at 2026-04-11T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45205
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-18T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45186
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068
3
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/micromatch/braces
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces
6
reference_url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
7
reference_url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
8
reference_url https://github.com/micromatch/braces/issues/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/issues/35
9
reference_url https://github.com/micromatch/braces/pull/37
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/37
10
reference_url https://github.com/micromatch/braces/pull/40
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://github.com/micromatch/braces/pull/40
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-4068
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
reference_id 1071632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071632
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
reference_id 2280600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280600
14
reference_url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
reference_id CVE-2024-4068
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-13T11:10:08Z/
url https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
15
reference_url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
reference_id GHSA-grv7-fg5c-xmjg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-grv7-fg5c-xmjg
16
reference_url https://access.redhat.com/errata/RHSA-2024:4464
reference_id RHSA-2024:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4464
17
reference_url https://access.redhat.com/errata/RHSA-2024:6211
reference_id RHSA-2024:6211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6211
fixed_packages
0
url pkg:deb/debian/node-braces@3.0.3%2B~3.0.4-1?distro=trixie
purl pkg:deb/debian/node-braces@3.0.3%2B~3.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.3%252B~3.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/node-braces@3.0.3%2B~3.0.5-1?distro=trixie
purl pkg:deb/debian/node-braces@3.0.3%2B~3.0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.3%252B~3.0.5-1%3Fdistro=trixie
aliases CVE-2024-4068, GHSA-grv7-fg5c-xmjg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mssa-dgz3-w7fh
Fixing_vulnerabilities
0
url VCID-zfmv-3d1v-qye6
vulnerability_id VCID-zfmv-3d1v-qye6
summary
Regular Expression Denial of Service (ReDoS) in braces
A vulnerability was found in Braces versions from v2.2.0 up to but not including v2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. This has been patched in version 2.3.1.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1109.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1109
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.5802
published_at 2026-04-11T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-12T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-13T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58008
published_at 2026-04-16T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-18T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-01T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.57952
published_at 2026-04-02T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57971
published_at 2026-04-04T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.57947
published_at 2026-04-07T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58003
published_at 2026-04-08T12:55:00Z
11
value 0.00357
scoring_system epss
scoring_elements 0.58004
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1109
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1547272
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1547272
3
reference_url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
4
reference_url https://snyk.io/vuln/npm:braces:20180219
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/npm:braces:20180219
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1109
reference_id CVE-2018-1109
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1109
6
reference_url https://github.com/advisories/GHSA-cwfw-4gq5-mrqx
reference_id GHSA-cwfw-4gq5-mrqx
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cwfw-4gq5-mrqx
7
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
fixed_packages
0
url pkg:deb/debian/node-braces@0?distro=trixie
purl pkg:deb/debian/node-braces@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@0%3Fdistro=trixie
1
url pkg:deb/debian/node-braces@3.0.2%2B~3.0.0-1?distro=trixie
purl pkg:deb/debian/node-braces@3.0.2%2B~3.0.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mssa-dgz3-w7fh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.2%252B~3.0.0-1%3Fdistro=trixie
2
url pkg:deb/debian/node-braces@3.0.2%2B~3.0.1-1?distro=trixie
purl pkg:deb/debian/node-braces@3.0.2%2B~3.0.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mssa-dgz3-w7fh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.2%252B~3.0.1-1%3Fdistro=trixie
3
url pkg:deb/debian/node-braces@3.0.3%2B~3.0.5-1?distro=trixie
purl pkg:deb/debian/node-braces@3.0.3%2B~3.0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.3%252B~3.0.5-1%3Fdistro=trixie
aliases CVE-2018-1109, GHSA-cwfw-4gq5-mrqx
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zfmv-3d1v-qye6
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-braces@3.0.2%252B~3.0.0-1%3Fdistro=trixie