mongodb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.mongodb.org|mongodb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

[5.0.0,5.0.25)[6.0.0,6.0.14)[7.0.0,7.0.6)[7.1.0,7.2.1)
  • M
Reachable Assertion

[r5.0.0,r7.0.0-rc0)
  • M
Denial of Service (DoS)

[5.0.0,5.0.7)
  • M
Stack-based Overflow

[,4.2.16)[4.3.0,4.4.11)[5.0.0,5.0.4)
  • M
Use After Free

[3.6.0,3.6.15)[4.0.0,4.0.13)[4.2.0,4.2.1)
  • M
Information Exposure

[4.4.0,4.4.4)
  • M
Improper Input Validation

[3.6.0,3.6.13)[4.0.0,4.0.10)
  • M
Denial of Service (DoS)

[3.6.0,3.6.9)[4.0.0,4.0.3)
  • M
Information Exposure

[,3.0.15)[3.2,3.2.14)[3.3,3.3.14)
  • M
Denial of Service (DoS)

[,2.6.0)
  • M
Denial of Service (DoS)

[4.0.0,4.0.7)
  • M
Integer Overflow or Wraparound

[3.6.0,3.6.20)[4.0.0,4.0.20)[4.2.0,4.2.9)[4.4.0,4.4.1)
  • M
Improper Handling of Exceptional Conditions

[4.4.0,4.4.1)
  • M
Improper Input Validation

[,2.4.13)
  • M
Incorrect Authorization

[3.6.0,3.6.18)[4.0.0,4.0.15)[4.2.0,4.2.3)[4.3.0,4.3.3)
  • M
Improper Check for Unusual or Exceptional Conditions

[4.2.0,4.2.2)
  • M
Resource Management Errors

[2.4.0,2.4.4]
  • C
Information Exposure

[3.4.0,3.4.10)
  • H
Remote Code Execution (RCE)

[3.4.0,3.4.22)[3.6.0,3.6.14)[4.0.0,4.0.11)
  • M
Improper Input Validation

[,2.4.0)
  • M
Improper Input Validation

[,2.6.2)
  • M
Improper Authentication

[0,)
  • H
Improper Input Validation

[4.2.0,4.2.9)
  • M
Improper Handling of Exceptional Conditions

[4.0,4.0.19)[4.2,4.2.8)[4.4,4.4.0)[4.5,4.5.1)
  • H
Denial of Service (DoS)

[2.4.0,2.6.0]
  • M
Improper Input Validation

[3.4.0,3.4.22)[3.6.0,3.6.14)[4.0.0,4.0.11)
  • H
Improper Authentication

[3.0.0,3.0.7)
  • M
Improper Input Validation

[3.6.0,3.6.11)[4.0.0,4.0.6)
  • H
Incorrect Comparison

[3.4.0,3.4.24)[3.6.0,3.6.15)[4.0.0,4.0.13)[4.2.0,4.2.1)
  • H
Insufficient Session Expiration

[3.4.0,3.4.22)[3.6.0,3.6.13)[4.0.0,4.0.9)
  • M
Denial of Service (DoS)

[3.4.0,3.4.19)[3.6.0,3.6.10)[4.0.0,4.0.5)
  • M
Improper Input Validation

[,2.2.0)
  • M
Denial of Service (DoS)

[3.6.0,3.6.21)[4.0.0,4.0.20)
  • M
Cross-site Scripting (XSS)

[3.6.0,3.6.20)[4.0.0,4.0.21)[4.2.0,4.2.10)
  • M
Access Restriction Bypass

[,2.4.5)[2.5.0,2.5.1)
  • M
Denial of Service (DoS)

[3.6.0,3.6.10)[4.0.0,4.0.5)
  • M
Access Restriction Bypass

[3.6.0,3.6.20)[4.0.0,4.0.20)[4.2.0,4.2.9)[4.4.0,4.4.1)[4.5.0,4.5.1)