CVE-2025-3113
17.04.2025, 07:15
A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliances internal database configurations can leverage the applications built-in Connector functionality to access Continuous Compliances internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Common Weakness Enumeration