Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mantisbt

About This Vendor

mantisbt is a technology vendor producing software and infrastructure products. As a software provider, mantisbt's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mantisbt's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 124 known vulnerabilities from mantisbt. This includes 2 critical-severity issues and 17 high-severity issues that represent significant risk. These vulnerabilities affect 8 distinct products across mantisbt's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2025, indicating decades of continuous security attention and research. Organizations deploying mantisbt products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-3102 2008-09-24 2025-04-09 - 5.0 Likely
CVE-2010-2574 2010-08-10 2025-04-11 - 2.1 Unknown
CVE-2010-2802 2010-09-07 2025-04-11 - 3.5 Unknown
CVE-2010-3303 2010-10-05 2025-04-11 - 3.5 Unknown
CVE-2010-3763 2010-10-05 2025-04-11 - 4.3 Likely
CVE-2010-4348 2011-01-03 2025-04-11 - 4.3 Likely
CVE-2010-4349 2011-01-03 2025-04-11 - 5.0 Likely
CVE-2010-4350 2011-01-03 2025-04-11 - 5.1 Unknown
CVE-2011-2938 2011-09-21 2025-04-11 - 4.3 Likely
CVE-2011-3356 2011-09-21 2025-04-11 - 4.3 Likely
CVE-2011-3357 2011-09-21 2025-04-11 - 6.8 Likely
CVE-2011-3358 2011-09-21 2025-04-11 - 4.3 Likely
CVE-2011-3578 2011-09-21 2025-04-11 - 4.3 Likely
CVE-2011-3755 2011-09-23 2025-04-11 - 5.0 Likely
CVE-2012-2691 2012-06-17 2025-04-11 - 7.5 Likely
CVE-2012-2692 2012-06-17 2025-04-11 - 3.6 Unknown
CVE-2012-1118 2012-06-29 2025-04-11 - 4.3 Likely
CVE-2012-1119 2012-06-29 2025-04-11 - 6.4 Likely
CVE-2012-1120 2012-06-29 2025-04-11 - 3.6 Unknown
CVE-2012-1121 2012-06-29 2025-04-11 - 4.9 Unknown
CVE-2012-1122 2012-06-29 2025-04-11 - 3.6 Unknown
CVE-2012-1123 2012-06-29 2025-04-11 - 7.5 Likely
CVE-2012-5522 2012-11-16 2025-04-11 - 5.5 Likely
CVE-2012-5523 2012-11-16 2025-04-11 - 5.5 Likely
CVE-2013-4460 2014-01-10 2025-04-11 - 3.5 Unknown
CVE-2014-2238 2014-03-05 2025-04-12 - 6.5 Likely
CVE-2014-1608 2014-03-18 2025-04-12 - 7.5 Likely
CVE-2014-1609 2014-03-20 2025-04-12 - 7.5 Likely
CVE-2013-0197 2014-05-15 2025-04-12 - 4.3 Likely
CVE-2013-1810 2014-05-15 2025-04-12 - 2.1 Unknown
CVE-2013-1883 2014-05-27 2025-04-12 - 5.0 Likely
CVE-2014-6387 2014-10-22 2025-04-12 - 5.0 Likely
CVE-2014-8554 2014-11-13 2025-04-12 - 7.5 Likely
CVE-2014-7146 2014-11-18 2025-04-12 - 7.5 Likely
CVE-2014-8598 2014-11-18 2025-04-12 - 6.4 Likely
CVE-2014-8986 2014-11-24 2025-04-12 - 3.5 Unknown
CVE-2014-8988 2014-11-24 2025-04-12 - 4.0 Likely
CVE-2014-9089 2014-11-28 2025-04-12 - 7.5 Likely
CVE-2014-9117 2014-12-06 2025-04-12 - 5.0 Likely
CVE-2014-9270 2014-12-08 2025-04-12 - 4.3 Likely
CVE-2014-9279 2014-12-08 2025-04-12 - 5.0 Likely
CVE-2014-9280 2014-12-08 2025-04-12 - 7.5 Likely
CVE-2014-9281 2014-12-09 2025-04-12 - 4.3 Likely
CVE-2014-6316 2014-12-12 2025-04-12 - 5.8 Likely
CVE-2014-8553 2014-12-17 2025-04-12 - 5.0 Likely
CVE-2014-9388 2014-12-17 2025-04-12 - 5.0 Likely
CVE-2014-9506 2015-01-04 2025-04-12 - 3.5 Unknown
CVE-2014-9269 2015-01-09 2025-04-12 - 2.6 Unknown
CVE-2014-9271 2015-01-09 2025-04-12 5.4 4.3 Likely
CVE-2014-9272 2015-01-09 2025-04-12 - 4.3 Likely
CVE-2014-9571 2015-01-26 2025-04-12 - 4.3 Likely
CVE-2014-9572 2015-01-26 2025-04-12 - 7.5 Likely
CVE-2014-9573 2015-01-26 2025-04-12 - 6.0 Unknown
CVE-2015-1042 2015-02-10 2025-04-12 - 5.8 Likely
CVE-2014-8987 2015-08-24 2025-04-12 - 3.5 Unknown
CVE-2014-9759 2016-04-11 2025-04-12 5.3 5.0 Likely
CVE-2016-6837 2017-01-10 2025-04-20 6.1 4.3 Likely
CVE-2016-5364 2017-02-17 2025-04-20 6.1 4.3 Likely
CVE-2016-7111 2017-02-17 2025-04-20 4.7 2.6 Unknown
CVE-2017-6797 2017-03-10 2025-04-20 6.1 4.3 Likely
CVE-2017-6799 2017-03-10 2025-04-20 6.1 4.3 Likely
CVE-2017-6958 2017-03-17 2025-04-20 6.1 4.3 Likely
CVE-2017-7222 2017-03-22 2025-04-20 6.1 4.3 Likely
CVE-2017-6973 2017-03-31 2025-04-20 4.8 3.5 Unknown
CVE-2017-7241 2017-03-31 2025-04-20 4.8 3.5 Unknown
CVE-2017-7309 2017-03-31 2025-04-20 4.8 3.5 Unknown
CVE-2017-7615 2017-04-16 2025-04-20 8.8 6.5 Likely
CVE-2017-7897 2017-04-18 2025-04-20 6.1 4.3 Likely
CVE-2017-7620 2017-05-21 2025-04-20 6.5 4.3 Likely
CVE-2015-5059 2017-08-01 2025-04-20 5.3 3.5 Unknown
CVE-2017-12061 2017-08-01 2025-04-20 6.1 4.3 Likely
CVE-2017-12062 2017-08-01 2025-04-20 6.1 4.3 Likely
CVE-2017-12419 2017-08-05 2025-04-20 4.9 4.0 Likely
CVE-2014-9701 2017-08-09 2025-04-20 6.5 4.3 Likely
CVE-2015-2046 2017-08-28 2025-04-20 6.1 4.3 Likely
CVE-2014-9624 2017-09-12 2025-04-20 7.5 5.0 Likely
CVE-2018-6382 2018-01-30 2024-11-21 3.3 2.1 Unknown
CVE-2018-6526 2018-02-02 2024-11-21 5.3 5.0 Likely
CVE-2018-13055 2018-08-03 2024-11-21 6.1 4.3 Likely
CVE-2018-14504 2018-08-03 2024-11-21 6.1 4.3 Likely
CVE-2018-16362 2018-09-02 2024-11-21 6.1 4.3 Likely
CVE-2018-17782 2018-10-30 2024-11-21 5.4 3.5 Unknown
CVE-2018-17783 2018-10-30 2024-11-21 5.4 3.5 Unknown
CVE-2018-9839 2019-06-06 2024-11-21 6.5 4.0 Likely
CVE-2018-16514 2019-06-20 2024-11-21 4.7 2.6 Unknown
CVE-2019-15074 2019-08-21 2024-11-21 9.6 6.8 Likely
CVE-2019-15715 2019-10-09 2024-11-21 7.2 6.5 Likely
CVE-2013-1930 2019-10-31 2024-11-21 4.3 4.0 Likely
CVE-2013-1931 2019-10-31 2024-11-21 6.1 4.3 Likely
CVE-2013-1932 2019-10-31 2024-11-21 5.4 3.5 Unknown
CVE-2013-1934 2019-10-31 2024-11-21 5.4 3.5 Unknown
CVE-2013-1811 2019-11-07 2024-11-21 4.3 4.0 Likely
CVE-2009-2802 2019-11-09 2024-11-21 6.1 4.3 Likely
CVE-2020-8981 2020-02-13 2024-11-21 6.1 4.3 Likely
CVE-2019-15539 2020-03-19 2024-11-21 6.1 4.3 Likely
CVE-2020-16266 2020-08-12 2024-11-21 5.4 3.5 Unknown
CVE-2020-25288 2020-09-30 2024-11-21 4.8 3.5 Unknown
CVE-2020-25781 2020-09-30 2024-11-21 4.3 4.0 Likely
CVE-2020-25830 2020-09-30 2024-11-21 4.8 3.5 Unknown
CVE-2020-35849 2020-12-30 2024-11-21 7.5 5.0 Likely
CVE-2020-28413 2020-12-30 2024-11-21 5.3 4.0 Likely
CVE-2020-36192 2021-01-18 2024-11-21 5.3 5.0 Likely
CVE-2020-29603 2021-01-29 2024-11-21 4.3 4.0 Likely
CVE-2020-29604 2021-01-29 2024-11-21 6.5 4.0 Likely
CVE-2020-29605 2021-01-29 2024-11-21 4.3 4.0 Likely
CVE-2020-35571 2021-02-22 2024-11-21 6.1 4.3 Likely
CVE-2009-20001 2021-03-07 2024-11-21 8.1 5.5 Likely
CVE-2021-33557 2021-06-17 2024-11-21 6.1 4.3 Likely
CVE-2022-26144 2022-04-13 2024-11-21 6.1 4.3 Likely
CVE-2021-43257 2022-04-14 2024-11-21 7.8 6.0 Unknown
CVE-2022-28508 2022-05-04 2024-11-21 6.1 4.3 Likely
CVE-2022-33910 2022-06-24 2024-11-21 5.4 3.5 Unknown
CVE-2023-22476 2023-02-23 2024-11-21 4.3 - -
CVE-2023-44394 2023-10-16 2025-08-11 4.3 - -
CVE-2023-49802 2023-12-11 2024-11-21 6.7 - -
CVE-2024-23830 2024-02-20 2024-12-18 8.3 - -
CVE-2024-34077 2024-05-14 2025-01-16 7.3 - -
CVE-2024-34080 2024-05-14 2025-01-16 5.3 - -
CVE-2024-34081 2024-05-14 2025-01-16 6.6 - -
CVE-2024-45792 2024-09-30 2025-08-15 6.5 - -
CVE-2025-46556 2025-11-04 2025-11-07 6.5 - -
CVE-2025-47776 2025-11-04 2025-11-10 9.1 - -
CVE-2025-55155 2025-11-04 2025-11-10 5.4 - -
CVE-2025-62520 2025-11-04 2025-11-10 4.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mantisbt by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mantisbt's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.