Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 308,819
With exploit
mantisbt / mantisbt
You can search for specific versions with
https://synscan.net/product/mantisbt/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-1118
Low
Jun 29, 2012
== 1.0.0-rc1
== 1.0.0a1
== 1.0.0-rc3
== 0.19.4
== 1.0.0a3
== 1.2.0a1
== 1.2.0a2
== 1.0.2
== 1.2.2
== 0.19.0a1
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 0.18.0
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.0.0-rc2
== 0.19.0a2
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
<= 1.2.8
== 1.0.6
== 0.19.5
== 1.0.0a2
== 1.0.8
== 1.1.1
CVE-2012-1119
Medium
Jun 29, 2012
== 1.0.0-rc1
== 1.0.0-rc3
== 0.19.4
== 1.0.0-a3
== 1.1.0-rc3
== 0.19.0-a2
== 1.0.2
== 1.2.2
== 0.19.0-a1
== 1.2.0-rc1
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 0.18.0
== 1.0.9
== 1.1.0-rc2
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.9
== 1.0.0-a2
== 1.1.4
== 1.0.3
== 1.1.0
== 1.0.0-rc2
== 1.1.0-a4
== 1.1.0-rc1
== 1.1.0-a2
== 1.1.5
== 1.0.7
== 1.1.0-a3
== 1.2.3
== 1.1.2
== 1.0.1
== 1.1.0-a1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.0-a1
== 1.1.3
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
<= 1.2.8
== 1.2.0-rc2
== 1.0.6
== 0.19.5
== 1.0.8
== 1.1.1
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2012-2691
High
Jun 17, 2012
== 1.0.0-rc1
== 1.0.0-rc3
== 0.19.4
== 1.0.0-a3
== 1.1.0-rc3
== 0.19.0-a2
== 1.0.2
== 1.2.2
== 0.19.0-a1
== 1.2.0-rc1
== 0.19.0-rc1
== 1.2.5
== 0.19.1
== 1.2.9
== 0.18.0
== 1.0.9
== 1.1.0-rc2
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.9
== 1.0.0-a2
== 1.1.4
== 1.0.3
== 1.2.8
<= 1.2.10
== 1.1.0
== 1.0.0-rc2
== 1.1.0-a4
== 1.1.0-rc1
== 1.1.0-a2
== 1.1.5
== 1.0.7
== 1.1.0-a3
== 1.2.3
== 1.1.2
== 1.0.1
== 1.1.0-a1
== 1.0.0-rc5
== 1.2.6
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.0-a1
== 1.1.3
== 1.0.5
== 1.1.8
== 1.2.7
== 1.2.4
== 0.19.0
== 1.0.0-rc4
== 1.2.0-rc2
== 0.19.5
== 1.0.8
== 1.1.1
== 1.2.0-alpha1
== 1.2.0-alpha2
== 1.2.0-alpha3
CVE-2011-3755
Medium
Sep 23, 2011
== 1.2.4
CVE-2011-3357
Medium
Sep 21, 2011
== 0.19.4
== 1.0.2
== 1.2.2
== 1.2.5
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.2.6
== 1.0.0
<= 1.2.7
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.4
== 1.0.6
== 1.0.8
== 1.1.1
CVE-2011-3358
Low
Sep 21, 2011
== 0.19.4
== 1.0.2
== 1.2.2
== 1.2.5
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.2.6
== 1.0.0
<= 1.2.7
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.4
== 1.0.6
== 1.0.8
== 1.1.1
CVE-2011-3578
Low
Sep 21, 2011
== 0.19.4
== 1.0.2
== 1.2.2
== 1.2.5
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.2.6
== 1.0.0
<= 1.2.7
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.4
== 1.0.6
== 1.0.8
== 1.1.1
CVE-2011-2938
Low
Sep 21, 2011
<= 1.2.6
== 0.19.4
== 1.0.2
== 1.2.2
== 1.2.5
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.4
== 1.0.6
== 1.0.8
== 1.1.1
CVE-2011-3356
Low
Sep 21, 2011
== 0.19.4
== 1.0.2
== 1.2.2
== 1.2.5
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.1.5
== 1.0.7
== 1.2.3
== 1.1.2
== 1.0.1
== 1.2.6
== 1.0.0
<= 1.2.7
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 1.2.4
== 1.0.6
== 1.0.8
== 1.1.1
CVE-2010-4349
Medium
Jan 3, 2011
== 1.0.0-rc1
== 1.0.0a1
== 1.0.0-rc3
== 0.19.4
== 1.0.0a3
== 1.0.2
== 1.2.2
<= 1.2.3
== 0.19.0a1
== 0.19.0-rc1
== 0.19.1
== 0.18.0
== 0.19.2
== 0.19.3
== 1.1.6
== 1.2.0
== 1.1.4
== 1.0.3
== 1.1.0
== 1.0.0-rc2
== 0.19.0a2
== 1.1.5
== 1.0.7
== 1.1.2
== 1.0.1
== 1.0.0-rc5
== 1.0.0
== 1.2.1
== 1.0.4
== 1.1.7
== 1.0.5
== 1.1.8
== 0.19.0
== 1.0.0-rc4
== 1.0.6
== 0.19.5
== 1.0.0a2
== 1.0.8
== 1.1.1
‹
›
‹
1
2
3
4
5
6
7
›