Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-8965
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-06 Apr, 2017 | 21:59
Updated At-20 Apr, 2025 | 01:37

Rogue Wave JViews before 8.8 patch 21 and 8.9 before patch 1 allows remote attackers to execute arbitrary Java code that exists in the classpath, such as test code or administration code. The issue exists because the ilog.views.faces.IlvFacesController servlet in jviews-framework-all.jar does not require explicit configuration of servlets that can be called.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Perforce Software, Inc.
perforce
>>jviews>>Versions up to 8.8(inclusive)
cpe:2.3:a:perforce:jviews:*:*:*:*:*:*:*:*
Perforce Software, Inc.
perforce
>>jviews>>8.9
cpe:2.3:a:perforce:jviews:8.9:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>data_integrator>>12.2.1.3.0
cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>data_integrator>>12.2.1.4.0
cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://rwkbp.makekb.com/?View=entry&EntryID=2521cve@mitre.org
Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.htmlcve@mitre.org
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlcve@mitre.org
Patch
https://rwkbp.makekb.com/?View=entry&EntryID=2521af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Change History
0Changes found

Details not found