Filtered by vendor Mongodb
Subscribe
Total
70 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-6376 | 1 Mongodb | 1 Compass | 2024-07-03 | N/A | 9.8 CRITICAL |
MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2 | |||||
CVE-2024-6375 | 1 Mongodb | 1 Mongodb | 2024-07-03 | N/A | 6.5 MEDIUM |
A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3. | |||||
CVE-2024-5629 | 2 Debian, Mongodb | 2 Debian Linux, Pymongo | 2024-06-18 | N/A | 8.1 HIGH |
An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory. | |||||
CVE-2023-0437 | 1 Mongodb | 1 C Driver | 2024-02-05 | N/A | 7.5 HIGH |
When calling bson_utf8_validateĀ on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0. | |||||
CVE-2023-4009 | 1 Mongodb | 1 Ops Manager Server | 2024-02-05 | N/A | 7.2 HIGH |
In MongoDB Ops Manager v5.0 prior to 5.0.22 and v6.0 prior to 6.0.17 it is possible for an authenticated user with project owner or project user admin access to generate an API key with the privileges of org owner resulting in privilege escalation. | |||||
CVE-2023-0342 | 1 Mongodb | 1 Ops Manager Server | 2024-02-04 | N/A | 5.3 MEDIUM |
MongoDB Ops Manager Diagnostics Archive may not redact sensitive PEM key file password app settings. Archives do not include the PEM files themselves. This issue affects MongoDB Ops Manager v5.0 prior to 5.0.21 and MongoDB Ops Manager v6.0 prior to 6.0.12 | |||||
CVE-2022-48282 | 1 Mongodb | 1 C\# Driver | 2024-02-04 | N/A | 7.2 HIGH |
Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0 | |||||
CVE-2022-24272 | 1 Mongodb | 1 Mongodb | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6. | |||||
CVE-2021-20334 | 2 Microsoft, Mongodb | 2 Windows, Compass | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows. | |||||
CVE-2020-7921 | 1 Mongodb | 1 Mongodb | 2024-02-04 | 3.5 LOW | 5.3 MEDIUM |
Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects MongoDB Server v4.2 versions prior to 4.2.3; MongoDB Server v4.0 versions prior to 4.0.15; MongoDB Server v4.3 versions prior to 4.3.3and MongoDB Server v3.6 versions prior to 3.6.18. | |||||
CVE-2020-7610 | 1 Mongodb | 1 Bson | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type. | |||||
CVE-2020-12135 | 2 Mongodb, Whoopsie Project | 2 C Driver, Whoopsie | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input. | |||||
CVE-2019-2391 | 1 Mongodb | 1 Js-bson | 2024-02-04 | 5.5 MEDIUM | 5.4 MEDIUM |
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure. This issue affects: MongoDB Inc. js-bson library version 1.1.3 and prior to. | |||||
CVE-2019-2388 | 1 Mongodb | 1 Ops Manager | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
In affected Ops Manager versions there is an exposed http route was that may allow attackers to view a specific access log of a publicly exposed Ops Manager instance. This issue affects: MongoDB Inc. MongoDB Ops Manager 4.0 versions 4.0.9, 4.0.10 and MongoDB Ops Manager 4.1 version 4.1.5. | |||||
CVE-2015-4411 | 2 Fedoraproject, Mongodb | 2 Fedora, Bson | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410. | |||||
CVE-2019-2386 | 1 Mongodb | 1 Mongodb | 2024-02-04 | 6.0 MEDIUM | 7.1 HIGH |
After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versions prior to 3.6.13 and MongoDB Server v3.4 versions prior to 3.4.22. Workaround: After deleting one or more users, restart any nodes which may have had active user authorization sessions. Refrain from creating user accounts with the same name as previously deleted accounts. | |||||
CVE-2019-2390 | 2 Microsoft, Mongodb | 2 Windows, Mongodb | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined code as the user running the utility. This issue MongoDB Server v4.0 versions prior to 4.0.11; MongoDB Server v3.6 versions prior to 3.6.14 and MongoDB Server v3.4 prior to 3.4.22. | |||||
CVE-2019-2389 | 1 Mongodb | 1 Mongodb | 2024-02-04 | 1.9 LOW | 4.2 MEDIUM |
Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init. This issue affects MongoDB Server v4.0 versions prior to 4.0.11; MongoDB Server v3.6 versions prior to 3.6.14; MongoDB Server v3.4 versions prior to 3.4.22. | |||||
CVE-2015-7882 | 1 Mongodb | 1 Mongodb | 2024-02-04 | 6.8 MEDIUM | 8.1 HIGH |
Improper handling of LDAP authentication in MongoDB Server versions 3.0.0 to 3.0.6 allows an unauthenticated client to gain unauthorized access. | |||||
CVE-2018-16790 | 1 Mongodb | 1 Libbson | 2024-02-04 | 5.8 MEDIUM | 8.1 HIGH |
_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer. |