CVE-2015-8361
08.02.2016, 19:59
Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port.Enginsight
Vendor | Product | Version |
---|---|---|
atlassian | bamboo | 2.4 |
atlassian | bamboo | 2.4.1 |
atlassian | bamboo | 2.4.2 |
atlassian | bamboo | 2.4.3 |
atlassian | bamboo | 2.5 |
atlassian | bamboo | 2.5.1 |
atlassian | bamboo | 2.5.2 |
atlassian | bamboo | 2.5.3 |
atlassian | bamboo | 2.5.5 |
atlassian | bamboo | 2.6 |
atlassian | bamboo | 2.6.1 |
atlassian | bamboo | 2.6.2 |
atlassian | bamboo | 2.6.3 |
atlassian | bamboo | 2.7 |
atlassian | bamboo | 2.7.1 |
atlassian | bamboo | 2.7.2 |
atlassian | bamboo | 2.7.3 |
atlassian | bamboo | 2.7.4 |
atlassian | bamboo | 3.0 |
atlassian | bamboo | 3.0.1 |
atlassian | bamboo | 3.0.2 |
atlassian | bamboo | 3.0.3 |
atlassian | bamboo | 3.1 |
atlassian | bamboo | 3.1.1 |
atlassian | bamboo | 3.1.3 |
atlassian | bamboo | 3.1.4 |
atlassian | bamboo | 3.2 |
atlassian | bamboo | 3.2.2 |
atlassian | bamboo | 3.3 |
atlassian | bamboo | 3.3.1 |
atlassian | bamboo | 3.3.2 |
atlassian | bamboo | 3.3.3 |
atlassian | bamboo | 3.3.4 |
atlassian | bamboo | 3.4 |
atlassian | bamboo | 3.4.1 |
atlassian | bamboo | 3.4.2 |
atlassian | bamboo | 3.4.3 |
atlassian | bamboo | 3.4.4 |
atlassian | bamboo | 3.4.5 |
atlassian | bamboo | 4.0 |
atlassian | bamboo | 4.0.1 |
atlassian | bamboo | 4.1 |
atlassian | bamboo | 4.1.1 |
atlassian | bamboo | 4.1.2 |
atlassian | bamboo | 4.2 |
atlassian | bamboo | 4.2.1 |
atlassian | bamboo | 4.3 |
atlassian | bamboo | 4.3.1 |
atlassian | bamboo | 4.3.2 |
atlassian | bamboo | 4.3.3 |
atlassian | bamboo | 4.3.4 |
atlassian | bamboo | 4.4 |
atlassian | bamboo | 4.4.1 |
atlassian | bamboo | 4.4.2 |
atlassian | bamboo | 4.4.3 |
atlassian | bamboo | 4.4.4 |
atlassian | bamboo | 4.4.5 |
atlassian | bamboo | 4.4.8 |
atlassian | bamboo | 5.0 |
atlassian | bamboo | 5.0:beta1 |
atlassian | bamboo | 5.0:beta2 |
atlassian | bamboo | 5.0:beta3 |
atlassian | bamboo | 5.0:rc1 |
atlassian | bamboo | 5.0.1 |
atlassian | bamboo | 5.1 |
atlassian | bamboo | 5.1.1 |
atlassian | bamboo | 5.2 |
atlassian | bamboo | 5.2.1 |
atlassian | bamboo | 5.2.2 |
atlassian | bamboo | 5.3 |
atlassian | bamboo | 5.4 |
atlassian | bamboo | 5.4.1 |
atlassian | bamboo | 5.4.2 |
atlassian | bamboo | 5.5 |
atlassian | bamboo | 5.6 |
atlassian | bamboo | 5.6.1 |
atlassian | bamboo | 5.6.2 |
atlassian | bamboo | 5.7 |
atlassian | bamboo | 5.7.1 |
atlassian | bamboo | 5.7.2 |
atlassian | bamboo | 5.8 |
atlassian | bamboo | 5.8.1 |
atlassian | bamboo | 5.8.2 |
atlassian | bamboo | 5.8.5 |
atlassian | bamboo | 5.9 |
atlassian | bamboo | 5.9.1 |
atlassian | bamboo | 5.9.2 |
atlassian | bamboo | 5.9.3 |
atlassian | bamboo | 5.9.4 |
atlassian | bamboo | 5.9.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References