regscale-cli 6.19.0.0__py3-none-any.whl → 6.19.0.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/__init__.py +1 -1
- regscale/models/integration_models/cisa_kev_data.json +3 -3
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/regscale_models/group.py +2 -1
- regscale/models/regscale_models/user_group.py +1 -1
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/METADATA +1 -1
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/RECORD +11 -11
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.19.0.0.dist-info → regscale_cli-6.19.0.1.dist-info}/top_level.txt +0 -0
regscale/__init__.py
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
__version__ = "6.19.0.
|
|
1
|
+
__version__ = "6.19.0.1"
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.04.
|
|
4
|
-
"dateReleased": "2025-04-
|
|
3
|
+
"catalogVersion": "2025.04.25",
|
|
4
|
+
"dateReleased": "2025-04-25T18:02:32.6749Z",
|
|
5
5
|
"count": 1323,
|
|
6
6
|
"vulnerabilities": [
|
|
7
7
|
{
|
|
@@ -6664,7 +6664,7 @@
|
|
|
6664
6664
|
"shortDescription": "Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service (DoS).",
|
|
6665
6665
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
6666
6666
|
"dueDate": "2023-03-03",
|
|
6667
|
-
"knownRansomwareCampaignUse": "
|
|
6667
|
+
"knownRansomwareCampaignUse": "Known",
|
|
6668
6668
|
"notes": "https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00051.html; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-2291",
|
|
6669
6669
|
"cwes": [
|
|
6670
6670
|
"CWE-20"
|