Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 308,819
With exploit
mantisbt / mantisbt
You can search for specific versions with
https://synscan.net/product/mantisbt/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2014-9089
High
Nov 28, 2014
<= 1.2.17
CVE-2014-8554
High
Nov 13, 2014
== 1.0.0-rc1
== 1.2.13
== 1.0.0a1
== 1.0.0-rc3
== 0.19.4
== 1.0.0-a3
== 1.1.0-rc3
== 1.0.0a3
== 1.2.0a1
== 1.2.15
== 1.2.0a2
== 0.19.0-a2
== 1.0.2
== 1.2.2
== 0.19.0-a1
== 1.2.0-rc1
== 0.19.0a1
== 1.2.12
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 1.2.10
== 1.2.9
== 0.18.0
== 1.0.9
== 1.1.0-rc2
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.9
== 1.0.0-a2
== 1.1.4
== 1.0.3
== 1.2.8
== 1.1.0
== 1.0.0-rc2
== 1.1.0-a4
== 1.2.16
== 1.1.0-rc1
== 0.19.0a2
== 1.1.0-a2
== 1.2.11
== 1.1.5
== 1.0.7
== 1.1.0-a3
== 1.2.3
== 1.1.2
== 1.0.1
== 1.1.0-a1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
<= 1.2.17
== 1.1.7
== 1.0.0-a1
== 1.1.3
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
== 1.2.0-rc2
== 1.0.6
== 0.19.5
== 1.0.0a2
== 1.0.8
== 1.2.14
== 1.1.1
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2014-6387
Medium
Oct 22, 2014
== 1.2.13
== 1.2.15
== 1.2.2
== 1.2.0-rc1
== 1.2.12
== 1.2.5
== 1.2.10
== 1.2.9
== 1.2.0
== 1.2.8
== 1.2.16
== 1.2.11
== 1.2.3
== 1.2.6
== 1.2.1
<= 1.2.17
== 1.2.7
== 1.2.4
== 1.2.0-rc2
== 1.2.14
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2013-1883
Medium
May 27, 2014
== 1.2.13
== 1.2.12
== 1.2.14
CVE-2014-1609
High
Mar 20, 2014
== 1.2.13
== 1.2.2
== 1.2.0-rc1
== 1.2.5
== 1.2.10
== 1.2.9
<= 1.2.15
== 1.2.0
== 1.2.8
== 1.2.11
== 1.2.3
== 1.2.6
== 1.2.1
== 1.2.7
== 1.2.4
== 1.2.0-rc2
== 1.2.14
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2014-1608
High
Mar 18, 2014
== 1.2.13
== 1.2.2
== 1.2.0-rc1
== 1.2.5
== 1.2.10
== 1.2.9
<= 1.2.15
== 1.2.0
== 1.2.8
== 1.2.11
== 1.2.3
== 1.2.6
== 1.2.1
== 1.2.7
== 1.2.4
== 1.2.0-rc2
== 1.2.14
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2014-2238
Medium
Mar 5, 2014
== 1.2.13
== 1.2.15
== 1.2.16
== 1.2.14
CVE-2013-4460
Low
Jan 10, 2014
== 1.0.0-rc1
== 1.2.13
== 1.0.0-rc3
== 1.0.0-a3
== 1.1.0-rc3
== 1.2.15
== 1.0.2
== 1.2.2
== 1.2.0-rc1
== 1.2.5
== 1.2.10
== 1.2.9
== 1.0.9
== 1.1.0-rc2
== 1.1.6
== 1.2.0
== 1.1.9
== 1.0.0-a2
== 1.1.4
== 1.0.3
== 1.2.8
== 1.1.0
== 1.0.0-rc2
== 1.1.0-a4
== 1.1.0-rc1
== 1.1.0-a2
== 1.2.11
== 1.1.5
== 1.0.7
== 1.1.0-a3
== 1.2.3
== 1.1.2
== 1.0.1
== 1.1.0-a1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.0-a1
== 1.1.3
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 1.0.0-rc4
== 1.2.0-rc2
== 1.0.6
== 1.0.8
== 1.2.14
== 1.1.1
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2012-1121
Low
Jun 29, 2012
== 1.0.0-rc1
== 1.0.0-rc3
== 0.19.4
== 1.0.0-a3
== 1.1.0-rc3
== 0.19.0-a2
== 1.0.2
== 1.2.2
== 0.19.0-a1
== 1.2.0-rc1
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 0.18.0
== 1.0.9
== 1.1.0-rc2
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.9
== 1.0.0-a2
== 1.1.4
== 1.0.3
== 1.1.0
== 1.0.0-rc2
== 1.1.0-a4
== 1.1.0-rc1
== 1.1.0-a2
== 1.1.5
== 1.0.7
== 1.1.0-a3
== 1.2.3
== 1.1.2
== 1.0.1
== 1.1.0-a1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.0-a1
== 1.1.3
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
<= 1.2.8
== 1.2.0-rc2
== 1.0.6
== 0.19.5
== 1.0.8
== 1.1.1
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2012-1122
Low
Jun 29, 2012
== 1.0.0-rc1
== 1.0.0a1
== 1.0.0-rc3
== 0.19.4
== 1.0.0a3
== 1.2.0a1
== 1.2.0a2
== 1.0.2
== 1.2.2
== 0.19.0a1
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 0.18.0
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.0.0-rc2
== 0.19.0a2
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
<= 1.2.8
== 1.0.6
== 0.19.5
== 1.0.0a2
== 1.0.8
== 1.1.1
‹
›
‹
1
2
3
4
5
6
7
›