regscale-cli 6.21.1.0__py3-none-any.whl → 6.21.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/core/app/application.py +8 -0
- regscale/integrations/commercial/__init__.py +8 -8
- regscale/integrations/commercial/import_all/import_all_cmd.py +2 -2
- regscale/integrations/commercial/microsoft_defender/__init__.py +0 -0
- regscale/integrations/commercial/{defender.py → microsoft_defender/defender.py} +38 -612
- regscale/integrations/commercial/microsoft_defender/defender_api.py +286 -0
- regscale/integrations/commercial/microsoft_defender/defender_constants.py +80 -0
- regscale/integrations/commercial/microsoft_defender/defender_scanner.py +168 -0
- regscale/integrations/commercial/qualys/__init__.py +24 -86
- regscale/integrations/commercial/qualys/containers.py +2 -0
- regscale/integrations/commercial/qualys/scanner.py +7 -2
- regscale/integrations/commercial/sonarcloud.py +110 -71
- regscale/integrations/commercial/wizv2/click.py +4 -1
- regscale/integrations/commercial/wizv2/data_fetcher.py +401 -0
- regscale/integrations/commercial/wizv2/finding_processor.py +295 -0
- regscale/integrations/commercial/wizv2/policy_compliance.py +1471 -204
- regscale/integrations/commercial/wizv2/policy_compliance_helpers.py +564 -0
- regscale/integrations/commercial/wizv2/scanner.py +4 -4
- regscale/integrations/compliance_integration.py +213 -61
- regscale/integrations/public/fedramp/fedramp_five.py +92 -7
- regscale/integrations/scanner_integration.py +27 -4
- regscale/models/__init__.py +1 -1
- regscale/models/integration_models/cisa_kev_data.json +79 -3
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/regscale_models/issue.py +29 -9
- regscale/models/regscale_models/milestone.py +15 -14
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/METADATA +1 -1
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/RECORD +33 -28
- tests/regscale/test_authorization.py +0 -65
- tests/regscale/test_init.py +0 -96
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.21.1.0.dist-info → regscale_cli-6.21.2.1.dist-info}/top_level.txt +0 -0
|
@@ -1,9 +1,85 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.08.
|
|
4
|
-
"dateReleased": "2025-08-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.08.25",
|
|
4
|
+
"dateReleased": "2025-08-25T17:04:19.9796Z",
|
|
5
|
+
"count": 1404,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-48384",
|
|
9
|
+
"vendorProject": "Git",
|
|
10
|
+
"product": "Git",
|
|
11
|
+
"vulnerabilityName": "Git Link Following Vulnerability",
|
|
12
|
+
"dateAdded": "2025-08-25",
|
|
13
|
+
"shortDescription": "Git contains a link following vulnerability that stems from Git\u2019s inconsistent handling of carriage return characters in configuration files.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-09-15",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/github.com\/git\/git\/security\/advisories\/GHSA-vwqx-4fm8-6qc9 ; https:\/\/access.redhat.com\/errata\/RHSA-2025:13933 ; https:\/\/alas.aws.amazon.com\/AL2\/ALAS2-2025-2941.html ; https:\/\/linux.oracle.com\/errata\/ELSA-2025-11534.html ; https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-48384 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48384",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-59",
|
|
20
|
+
"CWE-436"
|
|
21
|
+
]
|
|
22
|
+
},
|
|
23
|
+
{
|
|
24
|
+
"cveID": "CVE-2024-8068",
|
|
25
|
+
"vendorProject": "Citrix",
|
|
26
|
+
"product": "Session Recording",
|
|
27
|
+
"vulnerabilityName": "Citrix Session Recording Improper Privilege Management Vulnerability",
|
|
28
|
+
"dateAdded": "2025-08-25",
|
|
29
|
+
"shortDescription": "Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.",
|
|
30
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
31
|
+
"dueDate": "2025-09-15",
|
|
32
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
33
|
+
"notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8068",
|
|
34
|
+
"cwes": [
|
|
35
|
+
"CWE-269"
|
|
36
|
+
]
|
|
37
|
+
},
|
|
38
|
+
{
|
|
39
|
+
"cveID": "CVE-2024-8069",
|
|
40
|
+
"vendorProject": "Citrix",
|
|
41
|
+
"product": "Session Recording",
|
|
42
|
+
"vulnerabilityName": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability",
|
|
43
|
+
"dateAdded": "2025-08-25",
|
|
44
|
+
"shortDescription": "Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.",
|
|
45
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
46
|
+
"dueDate": "2025-09-15",
|
|
47
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
48
|
+
"notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8069",
|
|
49
|
+
"cwes": [
|
|
50
|
+
"CWE-502"
|
|
51
|
+
]
|
|
52
|
+
},
|
|
53
|
+
{
|
|
54
|
+
"cveID": "CVE-2025-43300",
|
|
55
|
+
"vendorProject": "Apple",
|
|
56
|
+
"product": "iOS, iPadOS, and macOS",
|
|
57
|
+
"vulnerabilityName": "Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability",
|
|
58
|
+
"dateAdded": "2025-08-21",
|
|
59
|
+
"shortDescription": "Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I\/O framework.",
|
|
60
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
61
|
+
"dueDate": "2025-09-11",
|
|
62
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
63
|
+
"notes": "https:\/\/support.apple.com\/en-us\/124925 ; https:\/\/support.apple.com\/en-us\/124926 ; https:\/\/support.apple.com\/en-us\/124927 ; https:\/\/support.apple.com\/en-us\/124928 ; https:\/\/support.apple.com\/en-us\/124929 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-43300",
|
|
64
|
+
"cwes": [
|
|
65
|
+
"CWE-787"
|
|
66
|
+
]
|
|
67
|
+
},
|
|
68
|
+
{
|
|
69
|
+
"cveID": "CVE-2025-54948",
|
|
70
|
+
"vendorProject": "Trend Micro",
|
|
71
|
+
"product": "Apex One",
|
|
72
|
+
"vulnerabilityName": "Trend Micro Apex One OS Command Injection Vulnerability",
|
|
73
|
+
"dateAdded": "2025-08-18",
|
|
74
|
+
"shortDescription": "Trend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.",
|
|
75
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
76
|
+
"dueDate": "2025-09-08",
|
|
77
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
78
|
+
"notes": "https:\/\/success.trendmicro.com\/en-US\/solution\/KA-0020652 ; N\/A ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54948",
|
|
79
|
+
"cwes": [
|
|
80
|
+
"CWE-78"
|
|
81
|
+
]
|
|
82
|
+
},
|
|
7
83
|
{
|
|
8
84
|
"cveID": "CVE-2025-8876",
|
|
9
85
|
"vendorProject": "N-able",
|