MongoDB 3.4.23

CPE Details

MongoDB 3.4.23
3.4.23
2020-11-30
14h21 +00:00
2020-11-30
14h21 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:mongodb:mongodb:3.4.23:*:*:*:*:*:*:*

Informations

Vendor

mongodb

Product

mongodb

Version

3.4.23

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-32036 2022-02-04 22h33 +00:00 An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.3; MongoDB Server v4.4 versions prior to and including 4.4.9; MongoDB Server v4.2 versions prior to and including 4.2.16 and MongoDB Server v4.0 versions prior to and including 4.0.28
7.1
Haute
CVE-2019-20925 2020-11-24 11h00 +00:00 An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13; MongoDB Server v3.6 versions prior to 3.6.15 and MongoDB Server v3.4 versions prior to 3.4.24.
7.5
Haute
CVE-2014-8180 2017-06-06 16h00 +00:00 MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.
5.5
Moyen