regscale-cli 6.20.3.0__py3-none-any.whl → 6.20.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

regscale/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = "6.20.3.0"
1
+ __version__ = "6.20.3.1"
@@ -1,9 +1,52 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.06.13",
4
- "dateReleased": "2025-06-13T16:08:40.4237Z",
5
- "count": 1364,
3
+ "catalogVersion": "2025.06.17",
4
+ "dateReleased": "2025-06-17T17:00:46.2025Z",
5
+ "count": 1367,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2023-0386",
9
+ "vendorProject": "Linux",
10
+ "product": "Kernel",
11
+ "vulnerabilityName": "Linux Kernel Improper Ownership Management Vulnerability",
12
+ "dateAdded": "2025-06-17",
13
+ "shortDescription": "Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel\u2019s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-07-08",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=4f11ada10d0a ; https:\/\/access.redhat.com\/security\/cve\/cve-2023-0386 ; https:\/\/security.netapp.com\/advisory\/ntap-20230420-0004\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-0386",
18
+ "cwes": [
19
+ "CWE-282"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2023-33538",
24
+ "vendorProject": "TP-Link",
25
+ "product": "Multiple Routers",
26
+ "vulnerabilityName": "TP-Link Multiple Routers Command Injection Vulnerability",
27
+ "dateAdded": "2025-06-16",
28
+ "shortDescription": "TP-Link TL-WR940N V2\/V4, TL-WR841N V8\/V10, and TL-WR740N V1\/V2 contain a command injection vulnerability via the component \/userRpm\/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-07-07",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/www.tp-link.com\/nordic\/support\/faq\/3562\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-33538",
33
+ "cwes": [
34
+ "CWE-77"
35
+ ]
36
+ },
37
+ {
38
+ "cveID": "CVE-2025-43200",
39
+ "vendorProject": "Apple",
40
+ "product": "Multiple Products",
41
+ "vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability",
42
+ "dateAdded": "2025-06-16",
43
+ "shortDescription": "Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.",
44
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45
+ "dueDate": "2025-07-07",
46
+ "knownRansomwareCampaignUse": "Unknown",
47
+ "notes": "https:\/\/support.apple.com\/en-us\/122174 ; https:\/\/support.apple.com\/en-us\/122173 ; https:\/\/support.apple.com\/en-us\/122900 ; https:\/\/support.apple.com\/en-us\/122901 ; https:\/\/support.apple.com\/en-us\/122902 ; https:\/\/support.apple.com\/en-us\/122903 ; https:\/\/support.apple.com\/en-us\/122904 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-43200",
48
+ "cwes": []
49
+ },
7
50
  {
8
51
  "cveID": "CVE-2025-33053",
9
52
  "vendorProject": "Web Distributed Authoring and Versioning",
@@ -29,7 +72,7 @@
29
72
  "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
73
  "dueDate": "2025-07-01",
31
74
  "knownRansomwareCampaignUse": "Unknown",
32
- "notes": "https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016",
75
+ "notes": "https:\/\/wazuh.com\/blog\/addressing-the-cve-2025-24016-vulnerability\/ ; https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016",
33
76
  "cwes": [
34
77
  "CWE-502"
35
78
  ]