regscale-cli 6.20.1.0__py3-none-any.whl → 6.20.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

regscale/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = "6.20.1.0"
1
+ __version__ = "6.20.1.1"
@@ -57,12 +57,18 @@ def sync_malwarebytes(regscale_ssp_id: int, url: str) -> None:
57
57
 
58
58
  @edr.command(name="sync_sentinelone")
59
59
  @regscale_ssp_id()
60
- def sync_sentinelone(regscale_ssp_id: int) -> None:
60
+ @click.option(
61
+ "--edr_events_url",
62
+ type=click.STRING,
63
+ help="Base URL for the SentinelOne Singularity Data Lake API. This URL is required if you plan to use the EDR Events API.",
64
+ required=False,
65
+ )
66
+ def sync_sentinelone(regscale_ssp_id: int, edr_events_url: str) -> None:
61
67
  """Sync Edr from Sentinelone to RegScale."""
62
68
  from regscale.models.integration_models.synqly_models.connectors import Edr
63
69
 
64
70
  edr_sentinelone = Edr("sentinelone")
65
- edr_sentinelone.run_sync(regscale_ssp_id=regscale_ssp_id)
71
+ edr_sentinelone.run_sync(regscale_ssp_id=regscale_ssp_id, edr_events_url=edr_events_url)
66
72
 
67
73
 
68
74
  @edr.command(name="sync_sophos")
@@ -24,6 +24,31 @@ def sync_autotask(regscale_id: int, regscale_module: str) -> None:
24
24
  ticketing_autotask.run_sync(regscale_id=regscale_id, regscale_module=regscale_module)
25
25
 
26
26
 
27
+ @ticketing.command(name="sync_freshdesk")
28
+ @regscale_id()
29
+ @regscale_module()
30
+ @click.option(
31
+ "--name",
32
+ type=click.STRING,
33
+ help="freshdesk name",
34
+ required=True,
35
+ prompt="freshdesk name",
36
+ )
37
+ @click.option(
38
+ "--subject",
39
+ type=click.STRING,
40
+ help="freshdesk subject",
41
+ required=True,
42
+ prompt="freshdesk subject",
43
+ )
44
+ def sync_freshdesk(regscale_id: int, regscale_module: str, name: str, subject: str) -> None:
45
+ """Sync Ticketing data between Freshdesk and RegScale."""
46
+ from regscale.models.integration_models.synqly_models.connectors import Ticketing
47
+
48
+ ticketing_freshdesk = Ticketing("freshdesk")
49
+ ticketing_freshdesk.run_sync(regscale_id=regscale_id, regscale_module=regscale_module, name=name, subject=subject)
50
+
51
+
27
52
  @ticketing.command(name="sync_jira")
28
53
  @regscale_id()
29
54
  @regscale_module()
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.05.27",
4
- "dateReleased": "2025-05-27T16:31:36.689Z",
3
+ "catalogVersion": "2025.05.29",
4
+ "dateReleased": "2025-05-29T11:25:31.4802Z",
5
5
  "count": 1352,
6
6
  "vulnerabilities": [
7
7
  {
@@ -8385,7 +8385,7 @@
8385
8385
  "shortDescription": "RARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation.",
8386
8386
  "requiredAction": "Apply updates per vendor instructions.",
8387
8387
  "dueDate": "2022-08-30",
8388
- "knownRansomwareCampaignUse": "Unknown",
8388
+ "knownRansomwareCampaignUse": "Known",
8389
8389
  "notes": "Vulnerability updated with version 6.12. Accessing link will download update information: https:\/\/www.rarlab.com\/rar\/rarlinux-x32-612.tar.gz; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-30333",
8390
8390
  "cwes": [
8391
8391
  "CWE-22",
@@ -8401,7 +8401,7 @@
8401
8401
  "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.",
8402
8402
  "requiredAction": "Apply updates per vendor instructions.",
8403
8403
  "dueDate": "2022-08-25",
8404
- "knownRansomwareCampaignUse": "Unknown",
8404
+ "knownRansomwareCampaignUse": "Known",
8405
8405
  "notes": "https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/9.0.0\/P24.1#Security_Fixes; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-27924",
8406
8406
  "cwes": [
8407
8407
  "CWE-93"
@@ -9615,7 +9615,7 @@
9615
9615
  "shortDescription": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.",
9616
9616
  "requiredAction": "Apply updates per vendor instructions.",
9617
9617
  "dueDate": "2022-06-15",
9618
- "knownRansomwareCampaignUse": "Unknown",
9618
+ "knownRansomwareCampaignUse": "Known",
9619
9619
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1710",
9620
9620
  "cwes": []
9621
9621
  },
@@ -14153,7 +14153,7 @@
14153
14153
  "shortDescription": "The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.",
14154
14154
  "requiredAction": "Apply updates per vendor instructions.",
14155
14155
  "dueDate": "2022-03-24",
14156
- "knownRansomwareCampaignUse": "Unknown",
14156
+ "knownRansomwareCampaignUse": "Known",
14157
14157
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-4681",
14158
14158
  "cwes": []
14159
14159
  },