Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.

Description
This pull request adds a new vulnerability check mode for MongoDB to detect exposure to the MongoBleed vulnerability (CVE-2025-14847).
It introduces a new monitoring mode that checks the running MongoDB server version and determines if it is vulnerable, patched, or not affected, based on known version ranges.
The new mode is integrated into the available plugin modes for MongoDB.
New MongoDB vulnerability detection:
vulnerabilitiesindatabase::mongodb::mode::vulnerabilitiesthat checks if the MongoDB server is affected by CVE-2025-14847 (MongoBleed) by parsing the server version and comparing it against known vulnerable ranges. The mode outputs the vulnerability status and version details, and provides documentation and usage examples.vulnerabilitiesmode in the MongoDB plugin, making it available as a monitoring option.Type of change
How this pull request can be tested ?
Checklist