Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
History

Tue, 22 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Tibco
Tibco spotfire Analyst
Tibco spotfire Analytics Platform
Tibco spotfire Deployment Kit
Tibco spotfire Desktop
Tibco spotfire Enterprise Runtime For R
Tibco spotfire Statistics Services
CPEs cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analyst:14.1.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analyst:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analyst:14.3.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analyst:14.4.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analyst:14.4.1:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_analytics_platform:*:*:*:*:*:aws_marketplace:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:14.1.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:14.3.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:14.4.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_deployment_kit:14.4.1:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:*:*:*:*:-:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:*:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.18.0:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.19.0:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.20.0:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.21.0:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.21.1:*:*:*:server:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:14.1.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:14.3.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:14.4.0:*:*:*:*:*:*:*
cpe:2.3:a:tibco:spotfire_statistics_services:14.4.1:*:*:*:*:*:*:*
Vendors & Products Tibco
Tibco spotfire Analyst
Tibco spotfire Analytics Platform
Tibco spotfire Deployment Kit
Tibco spotfire Desktop
Tibco spotfire Enterprise Runtime For R
Tibco spotfire Statistics Services
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 09 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Description Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
Title Spotfire Data Function Vulnerability
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tibco

Published: 2025-04-09T18:12:28.348Z

Updated: 2025-04-09T18:29:39.691Z

Reserved: 2025-04-02T10:56:03.148Z

Link: CVE-2025-3115

cve-icon Vulnrichment

Updated: 2025-04-09T18:29:21.379Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-09T18:15:50.813

Modified: 2025-04-22T16:46:51.650

Link: CVE-2025-3115

cve-icon Redhat

No data.