A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20.
References
Link | Resource |
---|---|
https://jira.mongodb.org/browse/SERVER-51083 | Issue Tracking Patch Vendor Advisory |
https://jira.mongodb.org/browse/SERVER-51083 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.mongodb.org/browse/SERVER-51083 - Issue Tracking, Patch, Vendor Advisory |
16 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20. |
23 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20. |
Information
Published : 2021-03-01 16:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7929
Mitre link : CVE-2020-7929
CVE.ORG link : CVE-2020-7929
JSON object : View
Products Affected
mongodb
- mongodb
CWE