We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.
Reserved 2025-04-02 | Published 2025-04-09 | Updated 2025-04-15 | Assigner tibcocommunity.spotfire.com/...2025-spotfire-cve-2025-3114-r3484/
Support options