Filtered by vendor Mongodb
Subscriptions
Total
130 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2026-25612 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 6.5 Medium |
| The internal locking mechanism of the MongoDB server uses an internal encoding of the resources in order to choose what lock to take. Collections may inadvertently collide with one another in this representation causing unavailability between them due to conflicting locks. | ||||
| CVE-2026-1848 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 7.5 High |
| Connections received from the proxy port may not count towards total accepted connections, resulting in server crashes if the total number of connections exceeds available resources. This only applies to connections accepted from the proxy port, pending the proxy protocol header. | ||||
| CVE-2026-25610 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 6.5 Medium |
| An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints. | ||||
| CVE-2026-25609 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 5.4 Medium |
| Incorrect validation of the profile command may result in the determination that a request altering the 'filter' is read-only. | ||||
| CVE-2026-1850 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 6.5 Medium |
| Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash. | ||||
| CVE-2026-1849 | 1 Mongodb | 1 Mongodb | 2026-02-12 | 6.5 Medium |
| MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression. | ||||
| CVE-2026-2303 | 1 Mongodb | 1 Go Driver | 2026-02-12 | 6.5 Medium |
| The mongo-go-driver repository contains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer. | ||||
| CVE-2026-25611 | 1 Mongodb | 1 Mongodb | 2026-02-11 | 7.5 High |
| A series of specifically crafted, unauthenticated messages can exhaust available memory and crash a MongoDB server. | ||||
| CVE-2026-1847 | 1 Mongodb | 1 Mongodb | 2026-02-11 | 6.5 Medium |
| Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash. | ||||
| CVE-2026-25613 | 1 Mongodb | 1 Mongodb | 2026-02-11 | 6.5 Medium |
| An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index. | ||||
| CVE-2026-2302 | 1 Mongodb | 1 Ruby Driver | 2026-02-11 | 6.5 Medium |
| Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code. | ||||
| CVE-2025-14911 | 1 Mongodb | 1 C Driver | 2026-01-29 | 6.5 Medium |
| User-controlled chunkSize metadata from MongoDB lacks appropriate validation allowing malformed GridFS metadata to overflow the bounding container. | ||||
| CVE-2025-12119 | 1 Mongodb | 2 C Driver, Php Driver | 2026-01-14 | 6.8 Medium |
| A mongoc_bulk_operation_t may read invalid memory if large options are passed. | ||||
| CVE-2025-14847 | 1 Mongodb | 1 Mongodb | 2026-01-14 | 7.5 High |
| Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0. | ||||
| CVE-2025-12657 | 1 Mongodb | 1 Mongodb | 2025-12-12 | 5 Medium |
| The KMIP response parser built into mongo binaries is overly tolerant of certain malformed packets, and may parse them into invalid objects. Later reads of this object can result in read access violations. | ||||
| CVE-2025-13643 | 1 Mongodb | 1 Mongodb | 2025-12-12 | 3.1 Low |
| A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14 | ||||
| CVE-2025-13644 | 1 Mongodb | 1 Mongodb | 2025-12-12 | 6.5 Medium |
| MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2 | ||||
| CVE-2025-14345 | 1 Mongodb | 1 Mongodb | 2025-12-11 | 4.2 Medium |
| A post-authentication flaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact. This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2. | ||||
| CVE-2025-12893 | 3 Apple, Microsoft, Mongodb | 3 Macos, Windows, Mongodb | 2025-12-05 | 4.2 Medium |
| Clients may successfully perform a TLS handshake with a MongoDB server despite presenting a client certificate not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = clientAuth may still be successfully authenticated via the TLS handshake as a client. This issue is specific to MongoDB servers running on Windows or Apple as the expected validation behavior functions correctly on Linux systems. Additionally, MongoDB servers may successfully establish egress TLS connections with servers that present server certificates not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = serverAuth may still be successfully authenticated via the TLS handshake as a server. This issue is specific to MongoDB servers running on Apple as the expected validation behavior functions correctly on both Linux and Windows systems. This vulnerability affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.16 and MongoDB Server v8.2 versions prior to 8.2.2 | ||||
| CVE-2025-13507 | 1 Mongodb | 1 Mongodb | 2025-12-05 | 6.5 Medium |
| Inconsistent object size validation in time series processing logic may result in later processing of oversized BSON documents leading to an assert failing and process termination. This issue impacts MongoDB Server v7.0 versions prior to 7.0.26, v8.0 versions prior to 8.0.16 and MongoDB server v8.2 versions prior to 8.2.1. | ||||
ReportizFlow