A valid, authenticated user with sufficient privileges...
Critical severity
Unreviewed
Published
Apr 17, 2025
to the GitHub Advisory Database
•
Updated Apr 17, 2025
Description
Published by the National Vulnerability Database
Apr 17, 2025
Published to the GitHub Advisory Database
Apr 17, 2025
Last updated
Apr 17, 2025
A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
References