CVE-2025-3115
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.
Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
Vendor
Product
CWE
Yayın Tarihi
2025-04-09 18:15:50
Güncelleme
2025-11-11 12:15:34
Source Identifier
security@tibco.com
KEV Date Added
-