mongodb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mongodb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure Through Log Files

<0:2.6.11-2.el7sat
  • M
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • M
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • M
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • H
SQL Injection

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • H
Deserialization of Untrusted Data

<0:2.6.11-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • H
XML External Entity (XXE) Injection

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • M
Reachable Assertion

*
  • M
Incorrect Use of Privileged APIs

*
  • M
Improper Input Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • M
Uncaught Exception

*
  • M
Exposed Dangerous Method or Function

*
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:2.6.11-2.el7sat
  • M
Return of Wrong Status Code

*
  • H
Improper Access Control

<0:2.6.11-2.el7sat
  • M
Numeric Range Comparison Without Minimum Check

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Null Byte Interaction Error (Poison Null Byte)

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Return of Wrong Status Code

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Insufficient Session Expiration

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Missing Required Cryptographic Step

<0:2.6.11-2.el7sat
  • H
Missing Required Cryptographic Step

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • M
Incorrect Authorization

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Covert Timing Channel

<0:2.6.11-2.el7sat
  • H
Incorrect Calculation

<0:2.6.11-2.el7sat
  • H
Missing Required Cryptographic Step

<0:2.6.11-2.el7sat
  • H
Missing Required Cryptographic Step

<0:2.6.11-2.el7sat
  • H
Missing Required Cryptographic Step

<0:2.6.11-2.el7sat
  • M
Directory Traversal

<0:2.6.11-2.el7sat
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:2.6.11-2.el7sat
  • H
Improper Certificate Validation

<0:2.6.11-2.el7sat
  • M
CVE-2013-6668

<0:2.6.11-2.el7sat
  • M
Information Exposure

<0:2.6.11-2.el7sat
  • M
Improper Input Validation

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • H
Improper Input Validation

<0:2.6.11-2.el7sat
  • H
Improper Input Validation

<0:2.6.11-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:2.6.11-2.el7sat
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:2.6.11-2.el7sat
  • M
Omission of Security-relevant Information

<0:2.6.11-2.el7sat
  • H
Information Exposure

<0:2.6.11-2.el7sat
  • H
Incomplete Blacklist

<0:2.6.11-2.el7sat
  • M
Resource Exhaustion

<0:2.6.11-2.el7sat
  • H
Out-of-Bounds

<0:2.6.11-2.el7sat
  • M
CVE-2016-6346

<0:2.6.11-2.el7sat
  • M
Access Restriction Bypass

<0:2.6.11-2.el7sat
  • M
Improper Data Handling

<0:2.6.11-2.el7sat
  • M
Improper Data Handling

<0:2.6.11-2.el7sat
  • M
Algorithmic Complexity

<0:2.6.11-2.el7sat