Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mongodb

About This Vendor

mongodb is a technology vendor producing software and infrastructure products. As a software provider, mongodb's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mongodb's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 120 known vulnerabilities from mongodb. This includes 2 critical-severity issues and 30 high-severity issues that represent significant risk. These vulnerabilities affect 73 distinct products across mongodb's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2013 through 2026, indicating decades of continuous security attention and research. Organizations deploying mongodb products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-4650 2013-07-04 2025-04-11 - 6.5 Likely
CVE-2013-2132 2013-08-15 2025-04-11 - 4.3 Likely
CVE-2013-1892 2013-10-01 2025-04-11 - 6.0 Unknown
CVE-2013-3969 2013-10-01 2025-04-11 - 6.5 Likely
CVE-2012-6619 2014-03-06 2025-04-12 - 6.4 Likely
CVE-2014-3971 2014-12-25 2025-04-12 - 5.0 Likely
CVE-2015-1609 2015-03-30 2025-04-12 - 5.0 Likely
CVE-2016-6494 2016-10-03 2025-04-12 5.5 2.1 Unknown
CVE-2016-3104 2017-04-14 2025-04-20 7.5 5.0 Likely
CVE-2014-8180 2017-06-06 2025-04-20 5.5 2.1 Unknown
CVE-2017-14227 2017-09-09 2025-11-03 7.5 5.0 Likely
CVE-2017-15535 2017-11-01 2025-04-20 9.1 6.4 Likely
CVE-2017-2665 2018-07-06 2024-11-21 4.8 1.9 Unknown
CVE-2018-13863 2018-07-10 2024-11-21 7.5 5.0 Likely
CVE-2018-16790 2018-09-10 2025-11-03 8.1 5.8 Likely
CVE-2015-7882 2019-07-19 2024-11-21 8.1 6.8 Likely
CVE-2019-2386 2019-08-06 2026-02-23 7.1 6.0 Unknown
CVE-2019-2389 2019-08-30 2024-11-21 5.3 1.9 Unknown
CVE-2019-2390 2019-08-30 2026-02-23 8.2 6.8 Likely
CVE-2015-4411 2020-02-20 2024-11-21 7.5 5.0 Likely
CVE-2020-7610 2020-03-30 2024-11-21 9.8 7.5 Likely
CVE-2019-2391 2020-03-31 2026-02-23 4.2 5.5 Likely
CVE-2020-7922 2020-04-09 2024-11-21 6.4 4.0 Likely
CVE-2020-12135 2020-04-24 2024-11-21 5.5 4.3 Likely
CVE-2020-7921 2020-05-06 2026-02-23 4.6 3.5 Unknown
CVE-2019-2388 2020-05-13 2026-02-23 5.8 5.0 Likely
CVE-2020-7923 2020-08-21 2024-11-21 6.5 4.0 Likely
CVE-2020-7925 2020-11-23 2024-11-21 7.5 5.0 Likely
CVE-2020-7926 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2018-20802 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2018-20804 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2018-20805 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2019-20923 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2019-20924 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2019-2392 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2019-2393 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2020-7928 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2018-20803 2020-11-23 2024-11-21 6.5 4.0 Likely
CVE-2020-7927 2020-11-23 2024-11-21 8.1 4.0 Likely
CVE-2019-20925 2020-11-24 2024-11-21 7.5 5.0 Likely
CVE-2021-20335 2021-02-11 2024-11-21 6.7 4.1 Unknown
CVE-2021-20327 2021-02-25 2024-11-21 6.4 4.3 Unknown
CVE-2021-20328 2021-02-25 2024-11-21 6.4 4.3 Unknown
CVE-2020-7929 2021-03-01 2024-11-21 6.5 4.0 Likely
CVE-2018-25004 2021-03-01 2024-11-21 4.9 4.0 Likely
CVE-2021-20334 2021-04-06 2024-11-21 4.8 4.6 Unknown
CVE-2020-7924 2021-04-12 2024-11-21 4.2 6.4 Likely
CVE-2021-20326 2021-04-30 2024-11-21 6.5 4.0 Likely
CVE-2021-20331 2021-05-13 2024-11-21 4.2 3.5 Unknown
CVE-2021-20329 2021-06-10 2024-11-21 6.8 4.0 Likely
CVE-2021-20333 2021-07-23 2024-11-21 5.3 5.0 Likely
CVE-2021-20332 2021-08-02 2024-11-21 4.2 2.1 Unknown
CVE-2021-32037 2021-11-24 2024-11-21 6.5 4.0 Likely
CVE-2021-20330 2021-12-15 2024-11-21 6.5 4.0 Likely
CVE-2021-32039 2022-01-20 2024-11-21 5.5 2.1 Unknown
CVE-2021-32036 2022-02-04 2024-11-21 5.4 5.5 Likely
CVE-2021-32040 2022-04-12 2024-11-21 6.5 5.0 Likely
CVE-2022-24272 2022-04-21 2024-11-21 6.5 4.0 Likely
CVE-2022-48282 2023-02-21 2024-11-21 6.6 - -
CVE-2023-0342 2023-06-09 2026-02-25 3.1 - -
CVE-2023-4009 2023-08-08 2025-02-13 7.2 - -
CVE-2023-1409 2023-08-23 2025-02-13 5.3 - -
CVE-2021-32050 2023-08-29 2025-11-03 4.2 - -
CVE-2023-0436 2023-11-07 2024-11-21 4.5 - -
CVE-2023-0437 2024-01-12 2025-11-03 5.3 - -
CVE-2024-1351 2024-03-07 2025-03-11 8.8 - -
CVE-2024-3371 2024-04-24 2025-02-06 7.1 - -
CVE-2024-3372 2024-05-14 2025-09-22 7.5 - -
CVE-2024-3374 2024-05-14 2025-09-29 5.3 - -
CVE-2024-5629 2024-06-05 2024-11-21 4.7 - -
CVE-2024-6375 2024-07-01 2024-11-21 5.4 - -
CVE-2024-6376 2024-07-01 2024-11-21 7.0 - -
CVE-2024-6381 2024-07-02 2025-11-03 4.0 - -
CVE-2024-6382 2024-07-02 2025-10-02 6.4 - -
CVE-2024-7553 2024-08-07 2024-09-19 7.3 - -
CVE-2024-6384 2024-08-13 2024-11-21 5.3 - -
CVE-2024-8207 2024-08-27 2025-05-16 6.4 - -
CVE-2024-8654 2024-09-10 2025-09-22 5.0 - -
CVE-2024-8305 2024-10-21 2024-11-07 6.5 - -
CVE-2024-8013 2024-10-28 2024-10-31 2.2 - -
CVE-2024-10921 2024-11-14 2025-10-01 6.8 - -
CVE-2025-1691 2025-02-27 2025-09-22 7.6 - -
CVE-2025-1692 2025-02-27 2025-09-22 6.3 - -
CVE-2025-1693 2025-02-27 2025-09-22 3.9 - -
CVE-2025-1755 2025-02-27 2025-04-09 7.5 - -
CVE-2025-1756 2025-02-27 2025-04-09 7.5 - -
CVE-2025-0755 2025-03-18 2025-11-03 8.4 - -
CVE-2025-3082 2025-04-01 2025-09-22 3.1 - -
CVE-2025-3083 2025-04-01 2025-09-22 7.5 - -
CVE-2025-3084 2025-04-01 2025-09-24 6.5 - -
CVE-2025-3085 2025-04-01 2025-09-24 8.1 - -
CVE-2025-6706 2025-06-26 2025-09-15 5.0 - -
CVE-2025-6707 2025-06-26 2025-09-26 4.2 - -
CVE-2025-6709 2025-06-26 2025-09-15 7.5 - -
CVE-2025-6710 2025-06-26 2025-09-15 7.5 - -
CVE-2025-6711 2025-07-07 2025-10-03 4.4 - -
CVE-2025-6712 2025-07-07 2025-10-03 6.5 - -
CVE-2025-6713 2025-07-07 2025-10-03 7.7 - -
CVE-2025-6714 2025-07-07 2025-10-03 7.5 - -
CVE-2025-7259 2025-07-07 2025-10-03 6.5 - -
CVE-2025-10059 2025-09-05 2025-09-22 6.5 - -
CVE-2025-10060 2025-09-05 2025-09-18 6.5 - -
CVE-2025-10061 2025-09-05 2025-11-13 6.5 - -
CVE-2025-11695 2025-10-13 2025-12-04 8.0 - -
CVE-2025-11979 2025-10-20 2025-12-04 5.3 - -
CVE-2025-12657 2025-11-03 2025-12-12 5.0 - -
CVE-2025-12119 2025-11-18 2026-01-14 6.8 - -
CVE-2025-12893 2025-11-25 2025-12-05 4.2 - -
CVE-2025-13507 2025-11-25 2025-12-05 6.5 - -
CVE-2025-13643 2025-11-25 2025-12-11 3.1 - -
CVE-2025-13644 2025-11-25 2025-12-11 6.5 - -
CVE-2025-14345 2025-12-09 2025-12-11 4.2 - -
CVE-2025-14847 2025-12-19 2026-01-13 7.5 - -
CVE-2026-1847 2026-02-10 2026-02-25 6.5 - -
CVE-2026-1848 2026-02-10 2026-02-25 7.5 - -
CVE-2026-1849 2026-02-10 2026-02-25 6.5 - -
CVE-2026-1850 2026-02-10 2026-02-25 6.5 - -
CVE-2026-25609 2026-02-10 2026-02-25 5.4 - -
CVE-2026-25610 2026-02-10 2026-02-25 6.5 - -
CVE-2026-25613 2026-02-10 2026-02-25 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mongodb by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mongodb's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.