Refine your search

10 vulnerabilities found for by MONGODB

CVE-2025-12119 (GCVE-0-2025-12119)
Vulnerability from cvelistv5
Published
2025-11-18 20:21
Modified
2025-11-19 16:48
CWE
  • CWE-825 - Expired Pointer Dereference
Summary
A mongoc_bulk_operation_t may read invalid memory if large options are passed.
Impacted products
Vendor Product Version
MongoDB C Driver Version: 1.9.0    1.30.5
Version: 2.0.0    2.1.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12119",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-19T16:14:28.900742Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-19T16:48:51.591Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://github.com/mongodb/mongo-c-driver",
          "defaultStatus": "unaffected",
          "product": "C Driver",
          "vendor": "MongoDB",
          "versions": [
            {
              "lessThanOrEqual": "1.30.5",
              "status": "affected",
              "version": "1.9.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.1.1",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://github.com/mongodb/mongo-php-driver",
          "defaultStatus": "unaffected",
          "product": "PHP Driver",
          "vendor": "MongoDB",
          "versions": [
            {
              "lessThanOrEqual": "2.1.2",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A mongoc_bulk_operation_t may read invalid memory if large options are passed."
            }
          ],
          "value": "A mongoc_bulk_operation_t may read invalid memory if large options are passed."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-825",
              "description": "CWE-825 Expired Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T20:21:08.252Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://github.com/mongodb/mongo-php-driver/releases/tag/1.21.2"
        },
        {
          "url": "https://github.com/mongodb/mongo-c-driver/releases/tag/1.30.6"
        },
        {
          "url": "https://github.com/mongodb/mongo-c-driver/releases/tag/2.1.2"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Bulk write with options may read invalid memory",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-12119",
    "datePublished": "2025-11-18T20:21:08.252Z",
    "dateReserved": "2025-10-23T16:43:24.098Z",
    "dateUpdated": "2025-11-19T16:48:51.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-12100 (GCVE-0-2025-12100)
Vulnerability from cvelistv5
Published
2025-10-23 21:02
Modified
2025-10-25 03:56
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12100",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-24T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-25T03:56:10.621Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "BI Connector ODBC driver",
          "vendor": "MongoDB",
          "versions": [
            {
              "lessThanOrEqual": "1.4.6",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-10-23T21:01:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.\u003cp\u003eThis issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.\u003c/p\u003e"
            }
          ],
          "value": "Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T21:02:18.599Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://github.com/mongodb/mongo-bi-connector-odbc-driver/releases/tag/v1.4.7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "MongoDB BI Connector ODBC driver installation via MSI may leave ACLs unset on custom installation directories",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-12100",
    "datePublished": "2025-10-23T21:02:18.599Z",
    "dateReserved": "2025-10-23T00:22:17.477Z",
    "dateUpdated": "2025-10-25T03:56:10.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-11575 (GCVE-0-2025-11575)
Vulnerability from cvelistv5
Published
2025-10-23 00:22
Modified
2025-10-24 03:55
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
Impacted products
Vendor Product Version
MongoDB Atlas SQL ODBC driver Version: 1.0.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11575",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-24T03:55:20.703Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Atlas SQL ODBC driver",
          "vendor": "MongoDB",
          "versions": [
            {
              "lessThanOrEqual": "2.0.0",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-10-09T14:14:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.\u003cp\u003eThis issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.\u003c/p\u003e"
            }
          ],
          "value": "Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T16:53:38.634Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://www.mongodb.com/docs/atlas/release-notes/sql/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "MongoDB Atlas SQL ODBC driver installation via MSI may leave ACLs unset on custom installation directories",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-11575",
    "datePublished": "2025-10-23T00:22:00.809Z",
    "dateReserved": "2025-10-09T23:13:28.369Z",
    "dateUpdated": "2025-10-24T03:55:20.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-11695 (GCVE-0-2025-11695)
Vulnerability from cvelistv5
Published
2025-10-13 16:22
Modified
2025-10-21 03:55
CWE
  • CWE-295 - Improper Certificate Validation
Summary
When tlsInsecure=False appears in a connection string, certificate validation is disabled. This vulnerability affects MongoDB Rust Driver versions prior to v3.2.5
Impacted products
Vendor Product Version
MongoDB Rust Driver Version: 0   < v3.2.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11695",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-20T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T03:55:19.647Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Rust Driver",
          "vendor": "MongoDB",
          "versions": [
            {
              "lessThan": "v3.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cp\u003e\u003c/p\u003e\u003c/b\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eWhen tlsInsecure=False appears in a connection string, certificate validation is disabled.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis vulnerability affects MongoDB Rust Driver versions prior to v3.2.5\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "When tlsInsecure=False appears in a connection string, certificate validation is disabled.\n\nThis vulnerability affects MongoDB Rust Driver versions prior to v3.2.5"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295: Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T16:22:57.417Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/RUST-2264"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Configuration may unexpectedly disable certificate validation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-11695",
    "datePublished": "2025-10-13T16:22:57.417Z",
    "dateReserved": "2025-10-13T16:15:52.158Z",
    "dateUpdated": "2025-10-21T03:55:19.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0755 (GCVE-0-2025-0755)
Vulnerability from cvelistv5
Published
2025-03-18 09:01
Modified
2025-11-03 19:35
CWE
  • CWE-122 - Heap-based Buffer Overflow
Summary
The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16
Impacted products
Vendor Product Version
MongoDB Inc libbson Version: 0   < 1.27.5
    cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*
Create a notification for this product.
   MongoDB Inc MongoDB Server Version: 8.0   < 8.0.1
Version: 7.0   < 7.0.16
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0755",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-18T13:20:06.283556Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T13:20:24.560Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:35:09.738Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "libbson",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.27.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB Server",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "8.0.1",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.16",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "selmelc"
        }
      ],
      "datePublic": "2025-03-18T09:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe various \u003ctt\u003ebson_append\u003c/tt\u003e\u0026nbsp;functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16\u003c/p\u003e"
            }
          ],
          "value": "The various bson_append\u00a0functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122: Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-24T08:42:52.079Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/SERVER-94461"
        },
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-5601"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB C Driver bson library may be susceptible to buffer overflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-0755",
    "datePublished": "2025-03-18T09:01:04.793Z",
    "dateReserved": "2025-01-27T16:13:12.042Z",
    "dateUpdated": "2025-11-03T19:35:09.738Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-6381 (GCVE-0-2024-6381)
Vulnerability from cvelistv5
Published
2024-07-02 17:14
Modified
2025-11-03 19:34
CWE
  • CWE-680 - Integer Overflow to Buffer Overflow
Summary
The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2
Impacted products
Vendor Product Version
MongoDB Inc libbson Version: 0   < 1.26.2
    cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6381",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-02T18:54:05.940356Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-02T18:57:49.237Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:28.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-5622"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "libbson",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.26.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-02T17:05:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-680",
              "description": "CWE-680: Integer Overflow to Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-02T17:14:48.908Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-5622"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB C Driver bson_strfreev may be susceptible to integer overflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2024-6381",
    "datePublished": "2024-07-02T17:14:48.908Z",
    "dateReserved": "2024-06-27T08:03:35.321Z",
    "dateUpdated": "2025-11-03T19:34:28.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-0437 (GCVE-0-2023-0437)
Vulnerability from cvelistv5
Published
2024-01-12 13:33
Modified
2025-11-03 19:27
CWE
  • CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
Impacted products
Vendor Product Version
MongoDB Inc MongoDB C Driver Version: 1.0.0   < 1.25.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:27:57.046Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "c_driver",
            "vendor": "mongodb",
            "versions": [
              {
                "lessThan": "1.25.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-0437",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-17T17:59:44.056559Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T16:58:13.664Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.25.0",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "selmelc"
        }
      ],
      "datePublic": "2024-01-12T14:13:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWhen calling \u003ctt\u003ebson_utf8_validate\u003c/tt\u003e\u0026nbsp;on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\u003c/p\u003e"
            }
          ],
          "value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-835",
              "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-24T03:06:26.169Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-4747"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB client C Driver may infinitely loop when validating certain BSON input data",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2023-0437",
    "datePublished": "2024-01-12T13:33:39.503Z",
    "dateReserved": "2023-01-23T11:11:02.350Z",
    "dateUpdated": "2025-11-03T19:27:57.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2021-32050 (GCVE-0-2021-32050)
Vulnerability from cvelistv5
Published
2023-08-29 15:24
Modified
2025-11-03 19:25
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:25:48.021Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/PHPC-1869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CXX-2028"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/SWIFT-1229"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/NODE-3356"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-32050",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-30T17:34:56.433321Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-30T17:46:35.484Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB C++ Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "3.7.0",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB PHP Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.9.2",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB Swift Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "1.1.1",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MongoDB Node.js Driver",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "3.6.10",
              "status": "affected",
              "version": "3.6",
              "versionType": "custom"
            },
            {
              "lessThan": "4.17.0",
              "status": "affected",
              "version": "4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.8.0",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThis issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e"
            }
          ],
          "value": "This issue only arises if an application enables the command listener feature (this is not enabled by default)."
        }
      ],
      "datePublic": "2023-08-29T16:21:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eSome MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\u003c/p\u003e\u003cp\u003eWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e\u003cp\u003eThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\u003c/p\u003e"
            }
          ],
          "value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-06T14:06:49.026Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/PHPC-1869"
        },
        {
          "url": "https://jira.mongodb.org/browse/CXX-2028"
        },
        {
          "url": "https://jira.mongodb.org/browse/SWIFT-1229"
        },
        {
          "url": "https://jira.mongodb.org/browse/CDRIVER-3797"
        },
        {
          "url": "https://jira.mongodb.org/browse/NODE-3356"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Some MongoDB Drivers may publish events containing authentication-related data to a command listener configured by an application",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2021-32050",
    "datePublished": "2023-08-29T15:24:30.389Z",
    "dateReserved": "2021-05-05T14:29:29.717Z",
    "dateUpdated": "2025-11-03T19:25:48.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2018-16790 (GCVE-0-2018-16790)
Vulnerability from cvelistv5
Published
2018-09-10 05:00
Modified
2025-11-03 19:25
Severity ?
CWE
  • n/a
Summary
_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:25:21.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.mongodb.org/browse/CDRIVER-2819"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-20T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.mongodb.org/browse/CDRIVER-2819"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16790",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84",
              "refsource": "CONFIRM",
              "url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
            },
            {
              "name": "https://jira.mongodb.org/browse/CDRIVER-2819",
              "refsource": "MISC",
              "url": "https://jira.mongodb.org/browse/CDRIVER-2819"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16790",
    "datePublished": "2018-09-10T05:00:00.000Z",
    "dateReserved": "2018-09-10T00:00:00.000Z",
    "dateUpdated": "2025-11-03T19:25:21.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2017-14227 (GCVE-0-2017-14227)
Vulnerability from cvelistv5
Published
2017-09-09 08:00
Modified
2025-11-03 19:25
Severity ?
CWE
  • n/a
Summary
In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:25:19.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
          },
          {
            "name": "100825",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100825"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-09-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T09:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
        },
        {
          "name": "100825",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100825"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-14227",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
            },
            {
              "name": "100825",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100825"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-14227",
    "datePublished": "2017-09-09T08:00:00.000Z",
    "dateReserved": "2017-09-09T00:00:00.000Z",
    "dateUpdated": "2025-11-03T19:25:19.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}