Refine your search
10 vulnerabilities found for by MONGODB
CVE-2025-12119 (GCVE-0-2025-12119)
Vulnerability from cvelistv5
Published
2025-11-18 20:21
Modified
2025-11-19 16:48
Severity ?
6.9 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-825 - Expired Pointer Dereference
Summary
A mongoc_bulk_operation_t may read invalid memory if large options are passed.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| MongoDB | C Driver |
Version: 1.9.0 ≤ 1.30.5 Version: 2.0.0 ≤ 2.1.1 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-12119",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-19T16:14:28.900742Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-19T16:48:51.591Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/mongodb/mongo-c-driver",
"defaultStatus": "unaffected",
"product": "C Driver",
"vendor": "MongoDB",
"versions": [
{
"lessThanOrEqual": "1.30.5",
"status": "affected",
"version": "1.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "2.1.1",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://github.com/mongodb/mongo-php-driver",
"defaultStatus": "unaffected",
"product": "PHP Driver",
"vendor": "MongoDB",
"versions": [
{
"lessThanOrEqual": "2.1.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A mongoc_bulk_operation_t may read invalid memory if large options are passed."
}
],
"value": "A mongoc_bulk_operation_t may read invalid memory if large options are passed."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-825",
"description": "CWE-825 Expired Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T20:21:08.252Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://github.com/mongodb/mongo-php-driver/releases/tag/1.21.2"
},
{
"url": "https://github.com/mongodb/mongo-c-driver/releases/tag/1.30.6"
},
{
"url": "https://github.com/mongodb/mongo-c-driver/releases/tag/2.1.2"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Bulk write with options may read invalid memory",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-12119",
"datePublished": "2025-11-18T20:21:08.252Z",
"dateReserved": "2025-10-23T16:43:24.098Z",
"dateUpdated": "2025-11-19T16:48:51.591Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-12100 (GCVE-0-2025-12100)
Vulnerability from cvelistv5
Published
2025-10-23 21:02
Modified
2025-10-25 03:56
Severity ?
8.8 (High) - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB | BI Connector ODBC driver |
Version: 1.0.0 < |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-12100",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-24T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-25T03:56:10.621Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "BI Connector ODBC driver",
"vendor": "MongoDB",
"versions": [
{
"lessThanOrEqual": "1.4.6",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-10-23T21:01:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.\u003cp\u003eThis issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.\u003c/p\u003e"
}
],
"value": "Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "CWE-276 Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T21:02:18.599Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://github.com/mongodb/mongo-bi-connector-odbc-driver/releases/tag/v1.4.7"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "MongoDB BI Connector ODBC driver installation via MSI may leave ACLs unset on custom installation directories",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-12100",
"datePublished": "2025-10-23T21:02:18.599Z",
"dateReserved": "2025-10-23T00:22:17.477Z",
"dateUpdated": "2025-10-25T03:56:10.621Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-11575 (GCVE-0-2025-11575)
Vulnerability from cvelistv5
Published
2025-10-23 00:22
Modified
2025-10-24 03:55
Severity ?
8.8 (High) - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB | Atlas SQL ODBC driver |
Version: 1.0.0 < |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11575",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-23T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-24T03:55:20.703Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Atlas SQL ODBC driver",
"vendor": "MongoDB",
"versions": [
{
"lessThanOrEqual": "2.0.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-10-09T14:14:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.\u003cp\u003eThis issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.\u003c/p\u003e"
}
],
"value": "Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "CWE-276 Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T16:53:38.634Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://www.mongodb.com/docs/atlas/release-notes/sql/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "MongoDB Atlas SQL ODBC driver installation via MSI may leave ACLs unset on custom installation directories",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-11575",
"datePublished": "2025-10-23T00:22:00.809Z",
"dateReserved": "2025-10-09T23:13:28.369Z",
"dateUpdated": "2025-10-24T03:55:20.703Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-11695 (GCVE-0-2025-11695)
Vulnerability from cvelistv5
Published
2025-10-13 16:22
Modified
2025-10-21 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
When tlsInsecure=False appears in a connection string, certificate validation is disabled.
This vulnerability affects MongoDB Rust Driver versions prior to v3.2.5
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB | Rust Driver |
Version: 0 < v3.2.5 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11695",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-20T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T03:55:19.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Rust Driver",
"vendor": "MongoDB",
"versions": [
{
"lessThan": "v3.2.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cb\u003e\u003cp\u003e\u003c/p\u003e\u003c/b\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eWhen tlsInsecure=False appears in a connection string, certificate validation is disabled.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis vulnerability affects MongoDB Rust Driver versions prior to v3.2.5\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "When tlsInsecure=False appears in a connection string, certificate validation is disabled.\n\nThis vulnerability affects MongoDB Rust Driver versions prior to v3.2.5"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295: Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T16:22:57.417Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/RUST-2264"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Configuration may unexpectedly disable certificate validation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-11695",
"datePublished": "2025-10-13T16:22:57.417Z",
"dateReserved": "2025-10-13T16:15:52.158Z",
"dateUpdated": "2025-10-21T03:55:19.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-0755 (GCVE-0-2025-0755)
Vulnerability from cvelistv5
Published
2025-03-18 09:01
Modified
2025-11-03 19:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| MongoDB Inc | libbson |
Version: 0 < 1.27.5 cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-0755",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T13:20:06.283556Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T13:20:24.560Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:35:09.738Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "libbson",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.27.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.1",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "7.0.16",
"status": "affected",
"version": "7.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "selmelc"
}
],
"datePublic": "2025-03-18T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe various \u003ctt\u003ebson_append\u003c/tt\u003e\u0026nbsp;functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16\u003c/p\u003e"
}
],
"value": "The various bson_append\u00a0functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122: Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-24T08:42:52.079Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-94461"
},
{
"url": "https://jira.mongodb.org/browse/CDRIVER-5601"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB C Driver bson library may be susceptible to buffer overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-0755",
"datePublished": "2025-03-18T09:01:04.793Z",
"dateReserved": "2025-01-27T16:13:12.042Z",
"dateUpdated": "2025-11-03T19:35:09.738Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-6381 (GCVE-0-2024-6381)
Vulnerability from cvelistv5
Published
2024-07-02 17:14
Modified
2025-11-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-680 - Integer Overflow to Buffer Overflow
Summary
The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | libbson |
Version: 0 < 1.26.2 cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6381",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T18:54:05.940356Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T18:57:49.237Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:34:28.669Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/CDRIVER-5622"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "libbson",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-07-02T17:05:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-680",
"description": "CWE-680: Integer Overflow to Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T17:14:48.908Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/CDRIVER-5622"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB C Driver bson_strfreev may be susceptible to integer overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2024-6381",
"datePublished": "2024-07-02T17:14:48.908Z",
"dateReserved": "2024-06-27T08:03:35.321Z",
"dateUpdated": "2025-11-03T19:34:28.669Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-0437 (GCVE-0-2023-0437)
Vulnerability from cvelistv5
Published
2024-01-12 13:33
Modified
2025-11-03 19:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB C Driver |
Version: 1.0.0 < 1.25.0 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:27:57.046Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/CDRIVER-4747"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*"
],
"defaultStatus": "unknown",
"product": "c_driver",
"vendor": "mongodb",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0437",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-17T17:59:44.056559Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T16:58:13.664Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB C Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "selmelc"
}
],
"datePublic": "2024-01-12T14:13:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eWhen calling \u003ctt\u003ebson_utf8_validate\u003c/tt\u003e\u0026nbsp;on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.\u003c/p\u003e"
}
],
"value": "When calling bson_utf8_validate\u00a0on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-835",
"description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-24T03:06:26.169Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/CDRIVER-4747"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB client C Driver may infinitely loop when validating certain BSON input data",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2023-0437",
"datePublished": "2024-01-12T13:33:39.503Z",
"dateReserved": "2023-01-23T11:11:02.350Z",
"dateUpdated": "2025-11-03T19:27:57.046Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2021-32050 (GCVE-0-2021-32050)
Vulnerability from cvelistv5
Published
2023-08-29 15:24
Modified
2025-11-03 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.
Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).
This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| MongoDB Inc | MongoDB C Driver |
Version: 1.0.0 < 1.17.7 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:25:48.021Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/PHPC-1869"
},
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/CXX-2028"
},
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/SWIFT-1229"
},
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/CDRIVER-3797"
},
{
"tags": [
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/NODE-3356"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-32050",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-30T17:34:56.433321Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-30T17:46:35.484Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB C Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.17.7",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB C++ Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "3.7.0",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB PHP Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.9.2",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB Swift Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.1.1",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB Node.js Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "3.6.10",
"status": "affected",
"version": "3.6",
"versionType": "custom"
},
{
"lessThan": "4.17.0",
"status": "affected",
"version": "4.0",
"versionType": "custom"
},
{
"lessThan": "5.8.0",
"status": "affected",
"version": "5.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThis issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e"
}
],
"value": "This issue only arises if an application enables the command listener feature (this is not enabled by default)."
}
],
"datePublic": "2023-08-29T16:21:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eSome MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\u003c/p\u003e\u003cp\u003eWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\u003c/p\u003e\u003cp\u003eThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).\u003c/p\u003e"
}
],
"value": "Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-06T14:06:49.026Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/PHPC-1869"
},
{
"url": "https://jira.mongodb.org/browse/CXX-2028"
},
{
"url": "https://jira.mongodb.org/browse/SWIFT-1229"
},
{
"url": "https://jira.mongodb.org/browse/CDRIVER-3797"
},
{
"url": "https://jira.mongodb.org/browse/NODE-3356"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0001/"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Some MongoDB Drivers may publish events containing authentication-related data to a command listener configured by an application",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2021-32050",
"datePublished": "2023-08-29T15:24:30.389Z",
"dateReserved": "2021-05-05T14:29:29.717Z",
"dateUpdated": "2025-11-03T19:25:48.021Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2018-16790 (GCVE-0-2018-16790)
Vulnerability from cvelistv5
Published
2018-09-10 05:00
Modified
2025-11-03 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer.
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:25:21.191Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jira.mongodb.org/browse/CDRIVER-2819"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-09-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-09-20T19:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jira.mongodb.org/browse/CDRIVER-2819"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16790",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84",
"refsource": "CONFIRM",
"url": "https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627923#c3"
},
{
"name": "https://jira.mongodb.org/browse/CDRIVER-2819",
"refsource": "MISC",
"url": "https://jira.mongodb.org/browse/CDRIVER-2819"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-16790",
"datePublished": "2018-09-10T05:00:00.000Z",
"dateReserved": "2018-09-10T00:00:00.000Z",
"dateUpdated": "2025-11-03T19:25:21.191Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2017-14227 (GCVE-0-2017-14227)
Vulnerability from cvelistv5
Published
2017-09-09 08:00
Modified
2025-11-03 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:25:19.804Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
},
{
"name": "100825",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/100825"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-15T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
},
{
"name": "100825",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/100825"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-14227",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489362"
},
{
"name": "100825",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100825"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489355"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489356"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-14227",
"datePublished": "2017-09-09T08:00:00.000Z",
"dateReserved": "2017-09-09T00:00:00.000Z",
"dateUpdated": "2025-11-03T19:25:19.804Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}