Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-3113


A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.


Published

2025-04-17T07:15:43.790

Last Modified

2025-04-17T20:21:48.243

Status

Awaiting Analysis

Source

[email protected]

Severity

-

Weaknesses
  • Type: Secondary
    CWE-284

Affected Vendors & Products

-


References