A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://portal.perforce.com/s/detail/a91PA000001SeefYAC |
![]() ![]() |
History
Thu, 17 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 17 Apr 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets. | |
Title | Improper Access Control in Delphix Masking Engine | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Perforce
Published: 2025-04-17T06:41:47.667Z
Updated: 2025-04-17T19:00:48.208Z
Reserved: 2025-04-02T10:24:35.710Z
Link: CVE-2025-3113

Updated: 2025-04-17T18:52:53.347Z

Status : Awaiting Analysis
Published: 2025-04-17T07:15:43.790
Modified: 2025-04-17T20:21:48.243
Link: CVE-2025-3113

No data.