{"uuid": "78fa56c5-7bad-4b54-acf6-0a9f8caafe9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://t.me/cvedetector/23214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3113 - Continuous Compliance Internal Database Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-3113 \nPublished : April 17, 2025, 7:15 a.m. | 56\u00a0minutes ago \nDescription : A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance\u2019s internal database configurations can leverage the application\u2019s built-in Connector functionality to access Continuous Compliance\u2019s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:09.000000Z"}