mongodb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.mongodb.org|mongodb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Validation of Consistency within Input

[6.0.0-alpha,6.0.17-rc0)[7.0.0-alpha,7.0.13-rc0)[7.3.0-alpha,7.3.4-rc0)
  • M
Improper Neutralization of Null Byte or NUL Character

[5.0.0,5.0.30)[6.0.0,6.0.19)[7.0.0,7.0.15)[8.0.0,8.0.3)
  • H
Improper Check for Unusual or Exceptional Conditions

[5.0.0,5.0.31-rc0)[6.0.0,6.0.20-rc1)[7.0.0,7.0.16-rc0)[8.0.0,8.0.4-rc0)
  • H
Uncaught Exception

[5.0.0,5.0.31)[6.0.0,6.0.20)[7.0.0,7.0.16)
  • L
Incorrect Authorization

[5.0.0,5.0.31-rc0)[6.0.0,6.0.20-rc1)[7.0.0,7.0.13-rc0)[7.3.0,7.3.4-rc0)
  • C
Improper Check for Certificate Revocation

[5.0.0,5.0.31-rc0)[6.0.0,6.0.20-rc1)[7.0.0,7.0.16-rc0)[8.0.0,8.0.4-rc0)
  • L
Use After Free

[6.0.0,8.0.4-rc0)
  • H
Uncontrolled Recursion

[6.0.0,6.0.21)[7.0.0,7.0.17)[8.0.0,8.0.5)
  • H
Improper Check for Unusual or Exceptional Conditions

[6.0.0,6.0.21)[7.0.0,7.0.17)[8.0.0,8.0.5)
  • L
Incorrect Authorization

[5.0.0-alpha,5.0.31-rc0)[6.0.0-alpha,6.0.24-rc0)[7.0.0-alpha,7.0.21-rc0)[8.0.0-alpha,8.0.5-rc0)
  • H
Incorrect Authorization

[6.0.0,6.0.22)[7.0.0,7.0.19)[8.0.0,8.0.7)[8.1.0-alpha0,8.1.0-rc1)
  • H
Allocation of Resources Without Limits or Throttling

[8.0.0,8.0.10-rc0)
  • H
Allocation of Resources Without Limits or Throttling

[6.0.0,6.0.23)[7.0.0,7.0.20)[8.0.0,8.0.9)
  • M
Insertion of Sensitive Information into Log File

[6.0.0,6.0.21)[7.0.0,7.0.18)[8.0.0,8.0.5)
  • H
Improper Check for Unusual or Exceptional Conditions

[8.0.0-alpha,8.0.16-rc0)[8.1.0-alpha,8.1.1-rc0)
  • H
Incorrect Permission Assignment for Critical Resource

[6.0.0-alpha,6.0.24-rc0)[7.0.0-alpha,7.0.18)[8.0.0-alpha,8.0.6)
  • H
Operation on a Resource after Expiration or Release

[4.2.25,6.0.25-rc0)
  • H
Improper Check for Unusual or Exceptional Conditions

[6.0.0-alpha,6.0.25-rc0)[7.0.0-alpha,7.0.22-rc0)[8.0.0-alpha,8.0.12-rc0)[8.1.0-alpha,8.1.2-rc0)
  • H
Uncontrolled Search Path Element

[6.0.0-alpha,6.0.25-rc0)[7.0.0-alpha,7.0.21-rc0)[8.0.0-alpha,8.0.5-rc0)
  • M
Improper Check for Unusual or Exceptional Conditions

[7.0.0,7.0.22)[8.0.0,8.0.10)
  • H
Improper Validation of Specified Quantity in Input

[7.0.0-alpha,7.0.26-rc0)[8.0.0-alpha,8.0.16-rc0)[8.2.0-alpha,8.2.1-rc0)
  • L
Race Condition

[7.0.0-alpha,7.0.26-rc0)[8.0.0-alpha,8.0.14-rc0)
  • L
Improper Certificate Validation

[7.0.0,7.0.26-rc0)[8.0.0,8.0.16-rc0)[8.1.0-alpha,8.2.2-rc0)
  • H
Reachable Assertion

[7.0.0-alpha,7.0.26-rc0)[8.0.0-alpha,8.0.13-rc0)[8.1.0-alpha,8.1.2-rc0)
  • L
Improper Locking

[5.0.0,5.0.32)[6.0.0,6.0.27)[7.0.0,7.0.26)[8.0.0,8.0.16)[8.2.0,8.2.2)
  • H
Improper Handling of Length Parameter Inconsistency

[,4.4.30)[5.0.0-alpha,5.0.32)[6.0.0-alpha,6.0.27)[7.0.0-alpha,7.0.28)[8.0.0-alpha,8.0.17)[8.2.0-alpha,8.2.3)
  • H
Uncontrolled Search Path Element

[5.0.0,5.0.27)[6.0.0,6.0.16)[7.0.0,7.0.12)[7.3.0,7.3.3)
  • L
Use of Uninitialized Variable

[6.0.0-alpha,6.0.4-rc0)[6.1.0-alpha,6.1.1-rc1)
  • H
Uncontrolled Search Path Element

[5.0.0-alpha,5.0.14-rc0)[6.0.0-alpha,6.0.3-rc0)[6.1.0-alpha,6.1.1-rc0)
  • M
Improper Authorization

[5.0.0,5.0.22)[6.0.0,6.0.11)[7.0.0-rc9,7.0.3)
  • H
Improper Certificate Validation

[3.2.6,4.4.29-rc0)[5.0.24,5.0.25-rc0)[6.0.13,6.0.14-rc0)[7.0.5,7.0.6-rc0)
  • M
Improper Certificate Validation

[4.4.0,4.4.23-rc0)[5.0.0,5.0.19-rc0)[6.0.0,6.0.7-rc0)[6.3.0,7.0.0-rc1)
  • M
Allocation of Resources Without Limits or Throttling

[4.0.28,4.2.17-rc0)[4.4.0,4.4.10-rc0)[5.0.0,5.0.4-rc0)
  • H
Improper Check for Unusual or Exceptional Conditions

[4.0.0,4.0.27)[4.2.0,4.2.16)[4.4.0,4.4.9)
  • H
Reachable Assertion

[5.0.0,5.1.0-rc0)
  • H
Improper Input Validation

[5.0.0,5.0.25)[6.0.0,6.0.14)[7.0.0,7.0.6)[7.1.0,7.2.1)
  • M
Reachable Assertion

[r5.0.0,r7.0.0-rc0)
  • M
Denial of Service (DoS)

[5.0.0,5.0.7)
  • M
Stack-based Overflow

[,4.2.16)[4.3.0,4.4.11)[5.0.0,5.0.4)
  • M
Use After Free

[3.6.0,3.6.15)[4.0.0,4.0.13)[4.2.0,4.2.1)
  • M
Information Exposure

[4.4.0,4.4.4)
  • M
Improper Input Validation

[3.6.0,3.6.13)[4.0.0,4.0.10)
  • M
Denial of Service (DoS)

[3.6.0,3.6.9)[4.0.0,4.0.3)
  • M
Information Exposure

[,3.0.15)[3.2,3.2.14)[3.3,3.3.14)
  • M
Denial of Service (DoS)

[,2.6.0)
  • M
Denial of Service (DoS)

[4.0.0,4.0.7)
  • M
Integer Overflow or Wraparound

[3.6.0,3.6.20)[4.0.0,4.0.20)[4.2.0,4.2.9)[4.4.0,4.4.1)
  • M
Improper Handling of Exceptional Conditions

[4.4.0,4.4.1)
  • M
Improper Input Validation

[,2.4.13)
  • M
Incorrect Authorization

[3.6.0,3.6.18)[4.0.0,4.0.15)[4.2.0,4.2.3)[4.3.0,4.3.3)
  • M
Improper Check for Unusual or Exceptional Conditions

[4.2.0,4.2.2)
  • M
Resource Management Errors

[2.4.0,2.4.4]
  • C
Information Exposure

[3.4.0,3.4.10)
  • H
Remote Code Execution (RCE)

[3.4.0,3.4.22)[3.6.0,3.6.14)[4.0.0,4.0.11)
  • M
Improper Input Validation

[,2.4.0)
  • M
Improper Input Validation

[,2.6.2)
  • M
Improper Authentication

[0,)
  • H
Improper Input Validation

[4.2.0,4.2.9)
  • M
Improper Handling of Exceptional Conditions

[4.0,4.0.19)[4.2,4.2.8)[4.4,4.4.0)[4.5,4.5.1)
  • H
Denial of Service (DoS)

[2.4.0,2.6.0]
  • M
Improper Input Validation

[3.4.0,3.4.22)[3.6.0,3.6.14)[4.0.0,4.0.11)
  • H
Improper Authentication

[3.0.0,3.0.7)
  • M
Improper Input Validation

[3.6.0,3.6.11)[4.0.0,4.0.6)
  • H
Incorrect Comparison

[3.4.0,3.4.24)[3.6.0,3.6.15)[4.0.0,4.0.13)[4.2.0,4.2.1)
  • H
Insufficient Session Expiration

[3.4.0,3.4.22)[3.6.0,3.6.13)[4.0.0,4.0.9)
  • M
Denial of Service (DoS)

[3.4.0,3.4.19)[3.6.0,3.6.10)[4.0.0,4.0.5)
  • M
Improper Input Validation

[,2.2.0)
  • M
Denial of Service (DoS)

[3.6.0,3.6.21)[4.0.0,4.0.20)
  • M
Cross-site Scripting (XSS)

[3.6.0,3.6.20)[4.0.0,4.0.21)[4.2.0,4.2.10)
  • M
Access Restriction Bypass

[,2.4.5)[2.5.0,2.5.1)
  • M
Denial of Service (DoS)

[3.6.0,3.6.10)[4.0.0,4.0.5)
  • M
Access Restriction Bypass

[3.6.0,3.6.20)[4.0.0,4.0.20)[4.2.0,4.2.9)[4.4.0,4.4.1)[4.5.0,4.5.1)