regscale-cli 6.21.2.0__py3-none-any.whl → 6.28.2.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (314) hide show
  1. regscale/_version.py +1 -1
  2. regscale/airflow/hierarchy.py +2 -2
  3. regscale/core/app/api.py +5 -2
  4. regscale/core/app/application.py +36 -6
  5. regscale/core/app/internal/control_editor.py +73 -21
  6. regscale/core/app/internal/evidence.py +727 -204
  7. regscale/core/app/internal/login.py +4 -2
  8. regscale/core/app/internal/model_editor.py +219 -64
  9. regscale/core/app/utils/app_utils.py +86 -12
  10. regscale/core/app/utils/catalog_utils/common.py +1 -1
  11. regscale/core/login.py +21 -4
  12. regscale/core/utils/async_graphql_client.py +363 -0
  13. regscale/core/utils/date.py +77 -1
  14. regscale/dev/cli.py +26 -0
  15. regscale/dev/code_gen.py +109 -24
  16. regscale/dev/version.py +72 -0
  17. regscale/integrations/commercial/__init__.py +30 -2
  18. regscale/integrations/commercial/aws/audit_manager_compliance.py +3908 -0
  19. regscale/integrations/commercial/aws/cli.py +3107 -54
  20. regscale/integrations/commercial/aws/cloudtrail_control_mappings.py +333 -0
  21. regscale/integrations/commercial/aws/cloudtrail_evidence.py +501 -0
  22. regscale/integrations/commercial/aws/cloudwatch_control_mappings.py +357 -0
  23. regscale/integrations/commercial/aws/cloudwatch_evidence.py +490 -0
  24. regscale/integrations/commercial/{amazon → aws}/common.py +71 -19
  25. regscale/integrations/commercial/aws/config_compliance.py +914 -0
  26. regscale/integrations/commercial/aws/conformance_pack_mappings.py +198 -0
  27. regscale/integrations/commercial/aws/control_compliance_analyzer.py +439 -0
  28. regscale/integrations/commercial/aws/evidence_generator.py +283 -0
  29. regscale/integrations/commercial/aws/guardduty_control_mappings.py +340 -0
  30. regscale/integrations/commercial/aws/guardduty_evidence.py +1053 -0
  31. regscale/integrations/commercial/aws/iam_control_mappings.py +368 -0
  32. regscale/integrations/commercial/aws/iam_evidence.py +574 -0
  33. regscale/integrations/commercial/aws/inventory/__init__.py +338 -22
  34. regscale/integrations/commercial/aws/inventory/base.py +107 -5
  35. regscale/integrations/commercial/aws/inventory/resources/analytics.py +390 -0
  36. regscale/integrations/commercial/aws/inventory/resources/applications.py +234 -0
  37. regscale/integrations/commercial/aws/inventory/resources/audit_manager.py +513 -0
  38. regscale/integrations/commercial/aws/inventory/resources/cloudtrail.py +315 -0
  39. regscale/integrations/commercial/aws/inventory/resources/cloudtrail_logs_metadata.py +476 -0
  40. regscale/integrations/commercial/aws/inventory/resources/cloudwatch.py +191 -0
  41. regscale/integrations/commercial/aws/inventory/resources/compute.py +328 -9
  42. regscale/integrations/commercial/aws/inventory/resources/config.py +464 -0
  43. regscale/integrations/commercial/aws/inventory/resources/containers.py +74 -9
  44. regscale/integrations/commercial/aws/inventory/resources/database.py +481 -31
  45. regscale/integrations/commercial/aws/inventory/resources/developer_tools.py +253 -0
  46. regscale/integrations/commercial/aws/inventory/resources/guardduty.py +286 -0
  47. regscale/integrations/commercial/aws/inventory/resources/iam.py +470 -0
  48. regscale/integrations/commercial/aws/inventory/resources/inspector.py +476 -0
  49. regscale/integrations/commercial/aws/inventory/resources/integration.py +175 -61
  50. regscale/integrations/commercial/aws/inventory/resources/kms.py +447 -0
  51. regscale/integrations/commercial/aws/inventory/resources/machine_learning.py +358 -0
  52. regscale/integrations/commercial/aws/inventory/resources/networking.py +390 -67
  53. regscale/integrations/commercial/aws/inventory/resources/s3.py +394 -0
  54. regscale/integrations/commercial/aws/inventory/resources/security.py +268 -72
  55. regscale/integrations/commercial/aws/inventory/resources/securityhub.py +473 -0
  56. regscale/integrations/commercial/aws/inventory/resources/storage.py +288 -29
  57. regscale/integrations/commercial/aws/inventory/resources/systems_manager.py +657 -0
  58. regscale/integrations/commercial/aws/inventory/resources/vpc.py +655 -0
  59. regscale/integrations/commercial/aws/kms_control_mappings.py +288 -0
  60. regscale/integrations/commercial/aws/kms_evidence.py +879 -0
  61. regscale/integrations/commercial/aws/ocsf/__init__.py +7 -0
  62. regscale/integrations/commercial/aws/ocsf/constants.py +115 -0
  63. regscale/integrations/commercial/aws/ocsf/mapper.py +435 -0
  64. regscale/integrations/commercial/aws/org_control_mappings.py +286 -0
  65. regscale/integrations/commercial/aws/org_evidence.py +666 -0
  66. regscale/integrations/commercial/aws/s3_control_mappings.py +356 -0
  67. regscale/integrations/commercial/aws/s3_evidence.py +632 -0
  68. regscale/integrations/commercial/aws/scanner.py +1072 -205
  69. regscale/integrations/commercial/aws/security_hub.py +319 -0
  70. regscale/integrations/commercial/aws/session_manager.py +282 -0
  71. regscale/integrations/commercial/aws/ssm_control_mappings.py +291 -0
  72. regscale/integrations/commercial/aws/ssm_evidence.py +492 -0
  73. regscale/integrations/commercial/jira.py +489 -153
  74. regscale/integrations/commercial/microsoft_defender/defender.py +326 -5
  75. regscale/integrations/commercial/microsoft_defender/defender_api.py +348 -14
  76. regscale/integrations/commercial/microsoft_defender/defender_constants.py +157 -0
  77. regscale/integrations/commercial/qualys/__init__.py +167 -68
  78. regscale/integrations/commercial/qualys/scanner.py +305 -39
  79. regscale/integrations/commercial/sarif/sairf_importer.py +432 -0
  80. regscale/integrations/commercial/sarif/sarif_converter.py +67 -0
  81. regscale/integrations/commercial/sicura/api.py +79 -42
  82. regscale/integrations/commercial/sicura/commands.py +8 -2
  83. regscale/integrations/commercial/sicura/scanner.py +83 -44
  84. regscale/integrations/commercial/stigv2/ckl_parser.py +5 -5
  85. regscale/integrations/commercial/synqly/assets.py +133 -16
  86. regscale/integrations/commercial/synqly/edr.py +2 -8
  87. regscale/integrations/commercial/synqly/query_builder.py +536 -0
  88. regscale/integrations/commercial/synqly/ticketing.py +27 -0
  89. regscale/integrations/commercial/synqly/vulnerabilities.py +165 -28
  90. regscale/integrations/commercial/tenablev2/cis_parsers.py +453 -0
  91. regscale/integrations/commercial/tenablev2/cis_scanner.py +447 -0
  92. regscale/integrations/commercial/tenablev2/commands.py +146 -5
  93. regscale/integrations/commercial/tenablev2/scanner.py +1 -3
  94. regscale/integrations/commercial/tenablev2/stig_parsers.py +113 -57
  95. regscale/integrations/commercial/wizv2/WizDataMixin.py +1 -1
  96. regscale/integrations/commercial/wizv2/click.py +191 -76
  97. regscale/integrations/commercial/wizv2/compliance/__init__.py +15 -0
  98. regscale/integrations/commercial/wizv2/{policy_compliance_helpers.py → compliance/helpers.py} +78 -60
  99. regscale/integrations/commercial/wizv2/compliance_report.py +1592 -0
  100. regscale/integrations/commercial/wizv2/core/__init__.py +133 -0
  101. regscale/integrations/commercial/wizv2/{async_client.py → core/client.py} +7 -3
  102. regscale/integrations/commercial/wizv2/{constants.py → core/constants.py} +92 -89
  103. regscale/integrations/commercial/wizv2/core/file_operations.py +237 -0
  104. regscale/integrations/commercial/wizv2/fetchers/__init__.py +11 -0
  105. regscale/integrations/commercial/wizv2/{data_fetcher.py → fetchers/policy_assessment.py} +66 -9
  106. regscale/integrations/commercial/wizv2/file_cleanup.py +104 -0
  107. regscale/integrations/commercial/wizv2/issue.py +776 -28
  108. regscale/integrations/commercial/wizv2/models/__init__.py +0 -0
  109. regscale/integrations/commercial/wizv2/parsers/__init__.py +34 -0
  110. regscale/integrations/commercial/wizv2/{parsers.py → parsers/main.py} +1 -1
  111. regscale/integrations/commercial/wizv2/processors/__init__.py +11 -0
  112. regscale/integrations/commercial/wizv2/{finding_processor.py → processors/finding.py} +1 -1
  113. regscale/integrations/commercial/wizv2/reports.py +243 -0
  114. regscale/integrations/commercial/wizv2/sbom.py +1 -1
  115. regscale/integrations/commercial/wizv2/scanner.py +1031 -441
  116. regscale/integrations/commercial/wizv2/utils/__init__.py +48 -0
  117. regscale/integrations/commercial/wizv2/{utils.py → utils/main.py} +116 -61
  118. regscale/integrations/commercial/wizv2/variables.py +89 -3
  119. regscale/integrations/compliance_integration.py +1036 -151
  120. regscale/integrations/control_matcher.py +432 -0
  121. regscale/integrations/due_date_handler.py +333 -0
  122. regscale/integrations/milestone_manager.py +291 -0
  123. regscale/integrations/public/__init__.py +14 -0
  124. regscale/integrations/public/cci_importer.py +834 -0
  125. regscale/integrations/public/csam/__init__.py +0 -0
  126. regscale/integrations/public/csam/csam.py +938 -0
  127. regscale/integrations/public/csam/csam_agency_defined.py +179 -0
  128. regscale/integrations/public/csam/csam_common.py +154 -0
  129. regscale/integrations/public/csam/csam_controls.py +432 -0
  130. regscale/integrations/public/csam/csam_poam.py +124 -0
  131. regscale/integrations/public/fedramp/click.py +77 -6
  132. regscale/integrations/public/fedramp/docx_parser.py +10 -1
  133. regscale/integrations/public/fedramp/fedramp_cis_crm.py +675 -289
  134. regscale/integrations/public/fedramp/fedramp_five.py +1 -1
  135. regscale/integrations/public/fedramp/poam/scanner.py +75 -7
  136. regscale/integrations/public/fedramp/poam_export_v5.py +888 -0
  137. regscale/integrations/scanner_integration.py +1961 -430
  138. regscale/models/integration_models/CCI_List.xml +1 -0
  139. regscale/models/integration_models/aqua.py +2 -2
  140. regscale/models/integration_models/cisa_kev_data.json +805 -11
  141. regscale/models/integration_models/flat_file_importer/__init__.py +5 -8
  142. regscale/models/integration_models/nexpose.py +36 -10
  143. regscale/models/integration_models/qualys.py +3 -4
  144. regscale/models/integration_models/synqly_models/capabilities.json +1 -1
  145. regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +87 -18
  146. regscale/models/integration_models/synqly_models/filter_parser.py +332 -0
  147. regscale/models/integration_models/synqly_models/ocsf_mapper.py +124 -25
  148. regscale/models/integration_models/synqly_models/synqly_model.py +89 -16
  149. regscale/models/locking.py +12 -8
  150. regscale/models/platform.py +4 -2
  151. regscale/models/regscale_models/__init__.py +7 -0
  152. regscale/models/regscale_models/assessment.py +2 -1
  153. regscale/models/regscale_models/catalog.py +1 -1
  154. regscale/models/regscale_models/compliance_settings.py +251 -1
  155. regscale/models/regscale_models/component.py +1 -0
  156. regscale/models/regscale_models/control_implementation.py +236 -41
  157. regscale/models/regscale_models/control_objective.py +74 -5
  158. regscale/models/regscale_models/file.py +2 -0
  159. regscale/models/regscale_models/form_field_value.py +5 -3
  160. regscale/models/regscale_models/inheritance.py +44 -0
  161. regscale/models/regscale_models/issue.py +301 -102
  162. regscale/models/regscale_models/milestone.py +33 -14
  163. regscale/models/regscale_models/organization.py +3 -0
  164. regscale/models/regscale_models/regscale_model.py +310 -73
  165. regscale/models/regscale_models/security_plan.py +4 -2
  166. regscale/models/regscale_models/vulnerability.py +3 -3
  167. regscale/regscale.py +25 -4
  168. regscale/templates/__init__.py +0 -0
  169. regscale/utils/threading/threadhandler.py +20 -15
  170. regscale/validation/record.py +23 -1
  171. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/METADATA +17 -33
  172. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/RECORD +310 -111
  173. tests/core/__init__.py +0 -0
  174. tests/core/utils/__init__.py +0 -0
  175. tests/core/utils/test_async_graphql_client.py +472 -0
  176. tests/fixtures/test_fixture.py +13 -8
  177. tests/regscale/core/test_login.py +171 -4
  178. tests/regscale/integrations/commercial/__init__.py +0 -0
  179. tests/regscale/integrations/commercial/aws/__init__.py +0 -0
  180. tests/regscale/integrations/commercial/aws/test_audit_manager_compliance.py +1304 -0
  181. tests/regscale/integrations/commercial/aws/test_audit_manager_evidence_aggregation.py +341 -0
  182. tests/regscale/integrations/commercial/aws/test_aws_analytics_collector.py +260 -0
  183. tests/regscale/integrations/commercial/aws/test_aws_applications_collector.py +242 -0
  184. tests/regscale/integrations/commercial/aws/test_aws_audit_manager_collector.py +1155 -0
  185. tests/regscale/integrations/commercial/aws/test_aws_cloudtrail_collector.py +534 -0
  186. tests/regscale/integrations/commercial/aws/test_aws_config_collector.py +400 -0
  187. tests/regscale/integrations/commercial/aws/test_aws_developer_tools_collector.py +203 -0
  188. tests/regscale/integrations/commercial/aws/test_aws_guardduty_collector.py +315 -0
  189. tests/regscale/integrations/commercial/aws/test_aws_iam_collector.py +458 -0
  190. tests/regscale/integrations/commercial/aws/test_aws_inspector_collector.py +353 -0
  191. tests/regscale/integrations/commercial/aws/test_aws_inventory_integration.py +530 -0
  192. tests/regscale/integrations/commercial/aws/test_aws_kms_collector.py +919 -0
  193. tests/regscale/integrations/commercial/aws/test_aws_machine_learning_collector.py +237 -0
  194. tests/regscale/integrations/commercial/aws/test_aws_s3_collector.py +722 -0
  195. tests/regscale/integrations/commercial/aws/test_aws_scanner_integration.py +722 -0
  196. tests/regscale/integrations/commercial/aws/test_aws_securityhub_collector.py +792 -0
  197. tests/regscale/integrations/commercial/aws/test_aws_systems_manager_collector.py +918 -0
  198. tests/regscale/integrations/commercial/aws/test_aws_vpc_collector.py +996 -0
  199. tests/regscale/integrations/commercial/aws/test_cli_evidence.py +431 -0
  200. tests/regscale/integrations/commercial/aws/test_cloudtrail_control_mappings.py +452 -0
  201. tests/regscale/integrations/commercial/aws/test_cloudtrail_evidence.py +788 -0
  202. tests/regscale/integrations/commercial/aws/test_config_compliance.py +298 -0
  203. tests/regscale/integrations/commercial/aws/test_conformance_pack_mappings.py +200 -0
  204. tests/regscale/integrations/commercial/aws/test_control_compliance_analyzer.py +375 -0
  205. tests/regscale/integrations/commercial/aws/test_datetime_parsing.py +223 -0
  206. tests/regscale/integrations/commercial/aws/test_evidence_generator.py +386 -0
  207. tests/regscale/integrations/commercial/aws/test_guardduty_control_mappings.py +564 -0
  208. tests/regscale/integrations/commercial/aws/test_guardduty_evidence.py +1041 -0
  209. tests/regscale/integrations/commercial/aws/test_iam_control_mappings.py +718 -0
  210. tests/regscale/integrations/commercial/aws/test_iam_evidence.py +1375 -0
  211. tests/regscale/integrations/commercial/aws/test_kms_control_mappings.py +656 -0
  212. tests/regscale/integrations/commercial/aws/test_kms_evidence.py +1163 -0
  213. tests/regscale/integrations/commercial/aws/test_ocsf_mapper.py +370 -0
  214. tests/regscale/integrations/commercial/aws/test_org_control_mappings.py +546 -0
  215. tests/regscale/integrations/commercial/aws/test_org_evidence.py +1240 -0
  216. tests/regscale/integrations/commercial/aws/test_s3_control_mappings.py +672 -0
  217. tests/regscale/integrations/commercial/aws/test_s3_evidence.py +987 -0
  218. tests/regscale/integrations/commercial/aws/test_scanner_evidence.py +373 -0
  219. tests/regscale/integrations/commercial/aws/test_security_hub_config_filtering.py +539 -0
  220. tests/regscale/integrations/commercial/aws/test_session_manager.py +516 -0
  221. tests/regscale/integrations/commercial/aws/test_ssm_control_mappings.py +588 -0
  222. tests/regscale/integrations/commercial/aws/test_ssm_evidence.py +735 -0
  223. tests/regscale/integrations/commercial/conftest.py +28 -0
  224. tests/regscale/integrations/commercial/microsoft_defender/__init__.py +1 -0
  225. tests/regscale/integrations/commercial/microsoft_defender/test_defender.py +1517 -0
  226. tests/regscale/integrations/commercial/microsoft_defender/test_defender_api.py +1748 -0
  227. tests/regscale/integrations/commercial/microsoft_defender/test_defender_constants.py +327 -0
  228. tests/regscale/integrations/commercial/microsoft_defender/test_defender_scanner.py +487 -0
  229. tests/regscale/integrations/commercial/test_aws.py +3742 -0
  230. tests/regscale/integrations/commercial/test_burp.py +48 -0
  231. tests/regscale/integrations/commercial/test_crowdstrike.py +49 -0
  232. tests/regscale/integrations/commercial/test_dependabot.py +341 -0
  233. tests/regscale/integrations/commercial/test_gcp.py +1543 -0
  234. tests/regscale/integrations/commercial/test_gitlab.py +549 -0
  235. tests/regscale/integrations/commercial/test_ip_mac_address_length.py +84 -0
  236. tests/regscale/integrations/commercial/test_jira.py +2204 -0
  237. tests/regscale/integrations/commercial/test_npm_audit.py +42 -0
  238. tests/regscale/integrations/commercial/test_okta.py +1228 -0
  239. tests/regscale/integrations/commercial/test_sarif_converter.py +251 -0
  240. tests/regscale/integrations/commercial/test_sicura.py +349 -0
  241. tests/regscale/integrations/commercial/test_snow.py +423 -0
  242. tests/regscale/integrations/commercial/test_sonarcloud.py +394 -0
  243. tests/regscale/integrations/commercial/test_sqlserver.py +186 -0
  244. tests/regscale/integrations/commercial/test_stig.py +33 -0
  245. tests/regscale/integrations/commercial/test_stig_mapper.py +153 -0
  246. tests/regscale/integrations/commercial/test_stigv2.py +406 -0
  247. tests/regscale/integrations/commercial/test_wiz.py +1365 -0
  248. tests/regscale/integrations/commercial/test_wiz_inventory.py +256 -0
  249. tests/regscale/integrations/commercial/wizv2/__init__.py +339 -0
  250. tests/regscale/integrations/commercial/wizv2/compliance/__init__.py +1 -0
  251. tests/regscale/integrations/commercial/wizv2/compliance/test_helpers.py +903 -0
  252. tests/regscale/integrations/commercial/wizv2/core/__init__.py +1 -0
  253. tests/regscale/integrations/commercial/wizv2/core/test_auth.py +701 -0
  254. tests/regscale/integrations/commercial/wizv2/core/test_client.py +1037 -0
  255. tests/regscale/integrations/commercial/wizv2/core/test_file_operations.py +989 -0
  256. tests/regscale/integrations/commercial/wizv2/fetchers/__init__.py +1 -0
  257. tests/regscale/integrations/commercial/wizv2/fetchers/test_policy_assessment.py +805 -0
  258. tests/regscale/integrations/commercial/wizv2/parsers/__init__.py +1 -0
  259. tests/regscale/integrations/commercial/wizv2/parsers/test_main.py +1153 -0
  260. tests/regscale/integrations/commercial/wizv2/processors/__init__.py +1 -0
  261. tests/regscale/integrations/commercial/wizv2/processors/test_finding.py +671 -0
  262. tests/regscale/integrations/commercial/wizv2/test_WizDataMixin.py +537 -0
  263. tests/regscale/integrations/commercial/wizv2/test_click_comprehensive.py +851 -0
  264. tests/regscale/integrations/commercial/wizv2/test_compliance_report_comprehensive.py +910 -0
  265. tests/regscale/integrations/commercial/wizv2/test_compliance_report_normalization.py +138 -0
  266. tests/regscale/integrations/commercial/wizv2/test_file_cleanup.py +283 -0
  267. tests/regscale/integrations/commercial/wizv2/test_file_operations.py +260 -0
  268. tests/regscale/integrations/commercial/wizv2/test_issue.py +343 -0
  269. tests/regscale/integrations/commercial/wizv2/test_issue_comprehensive.py +1203 -0
  270. tests/regscale/integrations/commercial/wizv2/test_reports.py +497 -0
  271. tests/regscale/integrations/commercial/wizv2/test_sbom.py +643 -0
  272. tests/regscale/integrations/commercial/wizv2/test_scanner_comprehensive.py +805 -0
  273. tests/regscale/integrations/commercial/wizv2/test_wiz_click_client_id.py +165 -0
  274. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_report.py +1394 -0
  275. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_unit.py +341 -0
  276. tests/regscale/integrations/commercial/wizv2/test_wiz_control_normalization.py +138 -0
  277. tests/regscale/integrations/commercial/wizv2/test_wiz_findings_comprehensive.py +364 -0
  278. tests/regscale/integrations/commercial/wizv2/test_wiz_inventory_comprehensive.py +644 -0
  279. tests/regscale/integrations/commercial/wizv2/test_wiz_status_mapping.py +149 -0
  280. tests/regscale/integrations/commercial/wizv2/test_wizv2.py +1218 -0
  281. tests/regscale/integrations/commercial/wizv2/test_wizv2_utils.py +519 -0
  282. tests/regscale/integrations/commercial/wizv2/utils/__init__.py +1 -0
  283. tests/regscale/integrations/commercial/wizv2/utils/test_main.py +1523 -0
  284. tests/regscale/integrations/public/__init__.py +0 -0
  285. tests/regscale/integrations/public/fedramp/__init__.py +1 -0
  286. tests/regscale/integrations/public/fedramp/test_gen_asset_list.py +150 -0
  287. tests/regscale/integrations/public/fedramp/test_poam_export_v5.py +1293 -0
  288. tests/regscale/integrations/public/test_alienvault.py +220 -0
  289. tests/regscale/integrations/public/test_cci.py +1053 -0
  290. tests/regscale/integrations/public/test_cisa.py +1021 -0
  291. tests/regscale/integrations/public/test_emass.py +518 -0
  292. tests/regscale/integrations/public/test_fedramp.py +1152 -0
  293. tests/regscale/integrations/public/test_fedramp_cis_crm.py +3661 -0
  294. tests/regscale/integrations/public/test_file_uploads.py +506 -0
  295. tests/regscale/integrations/public/test_oscal.py +453 -0
  296. tests/regscale/integrations/test_compliance_status_mapping.py +406 -0
  297. tests/regscale/integrations/test_control_matcher.py +1421 -0
  298. tests/regscale/integrations/test_control_matching.py +155 -0
  299. tests/regscale/integrations/test_milestone_manager.py +408 -0
  300. tests/regscale/models/test_control_implementation.py +118 -3
  301. tests/regscale/models/test_form_field_value_integration.py +304 -0
  302. tests/regscale/models/test_issue.py +378 -1
  303. tests/regscale/models/test_module_integration.py +582 -0
  304. tests/regscale/models/test_tenable_integrations.py +811 -105
  305. regscale/integrations/commercial/wizv2/policy_compliance.py +0 -3057
  306. regscale/integrations/public/fedramp/mappings/fedramp_r4_parts.json +0 -7388
  307. regscale/integrations/public/fedramp/mappings/fedramp_r5_parts.json +0 -9605
  308. regscale/integrations/public/fedramp/parts_mapper.py +0 -107
  309. /regscale/integrations/commercial/{amazon → sarif}/__init__.py +0 -0
  310. /regscale/integrations/commercial/wizv2/{wiz_auth.py → core/auth.py} +0 -0
  311. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/LICENSE +0 -0
  312. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/WHEEL +0 -0
  313. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/entry_points.txt +0 -0
  314. {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/top_level.txt +0 -0
@@ -1,9 +1,803 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.08.21",
4
- "dateReleased": "2025-08-21T17:02:19.8046Z",
5
- "count": 1401,
3
+ "catalogVersion": "2025.11.04",
4
+ "dateReleased": "2025-11-04T17:55:00.4405Z",
5
+ "count": 1455,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-48703",
9
+ "vendorProject": "CWP",
10
+ "product": "Control Web Panel",
11
+ "vulnerabilityName": "CWP Control Web Panel OS Command Injection Vulnerability",
12
+ "dateAdded": "2025-11-04",
13
+ "shortDescription": "CWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-11-25",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "https:\/\/control-webpanel.com\/changelog ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48703",
18
+ "cwes": [
19
+ "CWE-78"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2025-11371",
24
+ "vendorProject": "Gladinet",
25
+ "product": "CentreStack and Triofox",
26
+ "vulnerabilityName": "Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability",
27
+ "dateAdded": "2025-11-04",
28
+ "shortDescription": "Gladinet CentreStack and Triofox contains a files or directories accessible to external parties vulnerability that allows unintended disclosure of system files.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-11-25",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/www.centrestack.com\/p\/gce_latest_release.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-11371",
33
+ "cwes": [
34
+ "CWE-552"
35
+ ]
36
+ },
37
+ {
38
+ "cveID": "CVE-2025-41244",
39
+ "vendorProject": "Broadcom",
40
+ "product": "VMware Aria Operations and VMware Tools",
41
+ "vulnerabilityName": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability",
42
+ "dateAdded": "2025-10-30",
43
+ "shortDescription": "Broadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.",
44
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45
+ "dueDate": "2025-11-20",
46
+ "knownRansomwareCampaignUse": "Unknown",
47
+ "notes": "https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36149 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41244",
48
+ "cwes": [
49
+ "CWE-267"
50
+ ]
51
+ },
52
+ {
53
+ "cveID": "CVE-2025-24893",
54
+ "vendorProject": "XWiki",
55
+ "product": "Platform",
56
+ "vulnerabilityName": "XWiki Platform Eval Injection Vulnerability",
57
+ "dateAdded": "2025-10-30",
58
+ "shortDescription": "XWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch.",
59
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
60
+ "dueDate": "2025-11-20",
61
+ "knownRansomwareCampaignUse": "Unknown",
62
+ "notes": "https:\/\/github.com\/xwiki\/xwiki-platform\/security\/advisories\/GHSA-rr6p-3pfg-562j ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24893",
63
+ "cwes": [
64
+ "CWE-95"
65
+ ]
66
+ },
67
+ {
68
+ "cveID": "CVE-2025-6204",
69
+ "vendorProject": "Dassault Syst\u00e8mes",
70
+ "product": "DELMIA Apriso",
71
+ "vulnerabilityName": "Dassault Syst\u00e8mes DELMIA Apriso Code Injection Vulnerability",
72
+ "dateAdded": "2025-10-28",
73
+ "shortDescription": "Dassault Syst\u00e8mes DELMIA Apriso contains a code injection vulnerability that could allow an attacker to execute arbitrary code.",
74
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
75
+ "dueDate": "2025-11-18",
76
+ "knownRansomwareCampaignUse": "Unknown",
77
+ "notes": "https:\/\/www.3ds.com\/trust-center\/security\/security-advisories\/cve-2025-6204 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6204",
78
+ "cwes": [
79
+ "CWE-94"
80
+ ]
81
+ },
82
+ {
83
+ "cveID": "CVE-2025-6205",
84
+ "vendorProject": "Dassault Syst\u00e8mes",
85
+ "product": "DELMIA Apriso",
86
+ "vulnerabilityName": "Dassault Syst\u00e8mes DELMIA Apriso Missing Authorization Vulnerability",
87
+ "dateAdded": "2025-10-28",
88
+ "shortDescription": "Dassault Syst\u00e8mes DELMIA Apriso contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the application.",
89
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
90
+ "dueDate": "2025-11-18",
91
+ "knownRansomwareCampaignUse": "Unknown",
92
+ "notes": "https:\/\/www.3ds.com\/trust-center\/security\/security-advisories\/cve-2025-6205 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6205",
93
+ "cwes": [
94
+ "CWE-862"
95
+ ]
96
+ },
97
+ {
98
+ "cveID": "CVE-2025-54236",
99
+ "vendorProject": "Adobe",
100
+ "product": "Commerce and\u202fMagento",
101
+ "vulnerabilityName": "Adobe Commerce and\u202fMagento Improper Input Validation Vulnerability",
102
+ "dateAdded": "2025-10-24",
103
+ "shortDescription": "Adobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API.",
104
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
105
+ "dueDate": "2025-11-14",
106
+ "knownRansomwareCampaignUse": "Unknown",
107
+ "notes": "https:\/\/experienceleague.adobe.com\/en\/docs\/experience-cloud-kcs\/kbarticles\/ka-27397 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54236",
108
+ "cwes": [
109
+ "CWE-20"
110
+ ]
111
+ },
112
+ {
113
+ "cveID": "CVE-2025-59287",
114
+ "vendorProject": "Microsoft",
115
+ "product": "Windows",
116
+ "vulnerabilityName": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability",
117
+ "dateAdded": "2025-10-24",
118
+ "shortDescription": "Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.",
119
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
120
+ "dueDate": "2025-11-14",
121
+ "knownRansomwareCampaignUse": "Unknown",
122
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59287 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59287",
123
+ "cwes": [
124
+ "CWE-502"
125
+ ]
126
+ },
127
+ {
128
+ "cveID": "CVE-2025-61932",
129
+ "vendorProject": "Motex",
130
+ "product": "LANSCOPE Endpoint Manager",
131
+ "vulnerabilityName": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability",
132
+ "dateAdded": "2025-10-22",
133
+ "shortDescription": "Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.",
134
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
135
+ "dueDate": "2025-11-12",
136
+ "knownRansomwareCampaignUse": "Unknown",
137
+ "notes": "https:\/\/www.motex.co.jp\/news\/notice\/2025\/release251020\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61932",
138
+ "cwes": [
139
+ "CWE-940"
140
+ ]
141
+ },
142
+ {
143
+ "cveID": "CVE-2022-48503",
144
+ "vendorProject": "Apple",
145
+ "product": "Multiple Products",
146
+ "vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability",
147
+ "dateAdded": "2025-10-20",
148
+ "shortDescription": "Apple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
149
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
150
+ "dueDate": "2025-11-10",
151
+ "knownRansomwareCampaignUse": "Unknown",
152
+ "notes": "https:\/\/support.apple.com\/en-us\/HT213340 ; https:\/\/support.apple.com\/en-us\/HT213341 ; https:\/\/support.apple.com\/en-us\/HT213342 ; https:\/\/support.apple.com\/en-us\/HT213345 ; https:\/\/support.apple.com\/en-us\/HT213346 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-48503",
153
+ "cwes": []
154
+ },
155
+ {
156
+ "cveID": "CVE-2025-2746",
157
+ "vendorProject": "Kentico",
158
+ "product": "Xperience CMS",
159
+ "vulnerabilityName": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability",
160
+ "dateAdded": "2025-10-20",
161
+ "shortDescription": "Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.",
162
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
163
+ "dueDate": "2025-11-10",
164
+ "knownRansomwareCampaignUse": "Unknown",
165
+ "notes": "https:\/\/devnet.kentico.com\/download\/hotfixes ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-2746",
166
+ "cwes": [
167
+ "CWE-288"
168
+ ]
169
+ },
170
+ {
171
+ "cveID": "CVE-2025-2747",
172
+ "vendorProject": "Kentico",
173
+ "product": "Xperience CMS",
174
+ "vulnerabilityName": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability",
175
+ "dateAdded": "2025-10-20",
176
+ "shortDescription": "Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.",
177
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
178
+ "dueDate": "2025-11-10",
179
+ "knownRansomwareCampaignUse": "Unknown",
180
+ "notes": "https:\/\/devnet.kentico.com\/download\/hotfixes ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-2747",
181
+ "cwes": [
182
+ "CWE-288"
183
+ ]
184
+ },
185
+ {
186
+ "cveID": "CVE-2025-33073",
187
+ "vendorProject": "Microsoft",
188
+ "product": "Windows",
189
+ "vulnerabilityName": "Microsoft Windows SMB Client Improper Access Control Vulnerability",
190
+ "dateAdded": "2025-10-20",
191
+ "shortDescription": "Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.",
192
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
193
+ "dueDate": "2025-11-10",
194
+ "knownRansomwareCampaignUse": "Unknown",
195
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-33073 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-33073",
196
+ "cwes": [
197
+ "CWE-284"
198
+ ]
199
+ },
200
+ {
201
+ "cveID": "CVE-2025-61884",
202
+ "vendorProject": "Oracle",
203
+ "product": "E-Business Suite",
204
+ "vulnerabilityName": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability",
205
+ "dateAdded": "2025-10-20",
206
+ "shortDescription": "Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.",
207
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
208
+ "dueDate": "2025-11-10",
209
+ "knownRansomwareCampaignUse": "Known",
210
+ "notes": "https:\/\/www.oracle.com\/security-alerts\/alert-cve-2025-61884.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61884",
211
+ "cwes": [
212
+ "CWE-918"
213
+ ]
214
+ },
215
+ {
216
+ "cveID": "CVE-2025-54253",
217
+ "vendorProject": "Adobe",
218
+ "product": "Experience Manager (AEM) Forms",
219
+ "vulnerabilityName": "Adobe Experience Manager Forms Code Execution Vulnerability",
220
+ "dateAdded": "2025-10-15",
221
+ "shortDescription": "Adobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.",
222
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
223
+ "dueDate": "2025-11-05",
224
+ "knownRansomwareCampaignUse": "Unknown",
225
+ "notes": "https:\/\/helpx.adobe.com\/security\/products\/aem-forms\/apsb25-82.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54253",
226
+ "cwes": []
227
+ },
228
+ {
229
+ "cveID": "CVE-2025-47827",
230
+ "vendorProject": "IGEL",
231
+ "product": "IGEL OS",
232
+ "vulnerabilityName": "IGEL OS Use of a Key Past its Expiration Date Vulnerability",
233
+ "dateAdded": "2025-10-14",
234
+ "shortDescription": "IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.",
235
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
236
+ "dueDate": "2025-11-04",
237
+ "knownRansomwareCampaignUse": "Unknown",
238
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-47827 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-47827",
239
+ "cwes": [
240
+ "CWE-324"
241
+ ]
242
+ },
243
+ {
244
+ "cveID": "CVE-2025-24990",
245
+ "vendorProject": "Microsoft",
246
+ "product": "Windows",
247
+ "vulnerabilityName": "Microsoft Windows Untrusted Pointer Dereference Vulnerability",
248
+ "dateAdded": "2025-10-14",
249
+ "shortDescription": "Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.",
250
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
251
+ "dueDate": "2025-11-04",
252
+ "knownRansomwareCampaignUse": "Unknown",
253
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24990 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24990",
254
+ "cwes": [
255
+ "CWE-822"
256
+ ]
257
+ },
258
+ {
259
+ "cveID": "CVE-2025-59230",
260
+ "vendorProject": "Microsoft",
261
+ "product": "Windows",
262
+ "vulnerabilityName": "Microsoft Windows Improper Access Control Vulnerability",
263
+ "dateAdded": "2025-10-14",
264
+ "shortDescription": "Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.",
265
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
266
+ "dueDate": "2025-11-04",
267
+ "knownRansomwareCampaignUse": "Unknown",
268
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59230 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59230",
269
+ "cwes": [
270
+ "CWE-284"
271
+ ]
272
+ },
273
+ {
274
+ "cveID": "CVE-2016-7836",
275
+ "vendorProject": "SKYSEA",
276
+ "product": "Client View",
277
+ "vulnerabilityName": "SKYSEA Client View Improper Authentication Vulnerability",
278
+ "dateAdded": "2025-10-14",
279
+ "shortDescription": "SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.",
280
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
281
+ "dueDate": "2025-11-04",
282
+ "knownRansomwareCampaignUse": "Unknown",
283
+ "notes": "https:\/\/www.skyseaclientview.net\/news\/161221\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-7836",
284
+ "cwes": [
285
+ "CWE-287"
286
+ ]
287
+ },
288
+ {
289
+ "cveID": "CVE-2021-43798",
290
+ "vendorProject": "Grafana Labs",
291
+ "product": "Grafana",
292
+ "vulnerabilityName": "Grafana Path Traversal Vulnerability",
293
+ "dateAdded": "2025-10-09",
294
+ "shortDescription": "Grafana contains a path traversal vulnerability that could allow access to local files.",
295
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
296
+ "dueDate": "2025-10-30",
297
+ "knownRansomwareCampaignUse": "Unknown",
298
+ "notes": "https:\/\/grafana.com\/blog\/2021\/12\/07\/grafana-8.3.1-8.2.7-8.1.8-and-8.0.7-released-with-high-severity-security-fix\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43798",
299
+ "cwes": [
300
+ "CWE-22"
301
+ ]
302
+ },
303
+ {
304
+ "cveID": "CVE-2025-27915",
305
+ "vendorProject": "Synacor",
306
+ "product": "Zimbra Collaboration Suite (ZCS)",
307
+ "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability",
308
+ "dateAdded": "2025-10-07",
309
+ "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.",
310
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
311
+ "dueDate": "2025-10-28",
312
+ "knownRansomwareCampaignUse": "Unknown",
313
+ "notes": "https:\/\/wiki.zimbra.com\/wiki\/Security_Center ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27915",
314
+ "cwes": [
315
+ "CWE-79"
316
+ ]
317
+ },
318
+ {
319
+ "cveID": "CVE-2021-22555",
320
+ "vendorProject": "Linux",
321
+ "product": "Kernel",
322
+ "vulnerabilityName": "Linux Kernel Heap Out-of-Bounds Write Vulnerability",
323
+ "dateAdded": "2025-10-06",
324
+ "shortDescription": "Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.",
325
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
326
+ "dueDate": "2025-10-27",
327
+ "knownRansomwareCampaignUse": "Unknown",
328
+ "notes": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/net\/netfilter\/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/net\/netfilter\/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https:\/\/security.netapp.com\/advisory\/ntap-20210805-0010\/ ; https:\/\/github.com\/google\/security-research\/security\/advisories\/GHSA-xxx5-8mvq-3528 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22555",
329
+ "cwes": [
330
+ "CWE-787"
331
+ ]
332
+ },
333
+ {
334
+ "cveID": "CVE-2010-3962",
335
+ "vendorProject": "Microsoft",
336
+ "product": "Internet Explorer",
337
+ "vulnerabilityName": "Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability",
338
+ "dateAdded": "2025-10-06",
339
+ "shortDescription": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
340
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
341
+ "dueDate": "2025-10-27",
342
+ "knownRansomwareCampaignUse": "Unknown",
343
+ "notes": "https:\/\/learn.microsoft.com\/en-us\/security-updates\/SecurityAdvisories\/2010\/2458511?redirectedfrom=MSDN ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-3962",
344
+ "cwes": []
345
+ },
346
+ {
347
+ "cveID": "CVE-2021-43226",
348
+ "vendorProject": "Microsoft",
349
+ "product": "Windows",
350
+ "vulnerabilityName": "Microsoft Windows Privilege Escalation Vulnerability",
351
+ "dateAdded": "2025-10-06",
352
+ "shortDescription": "Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.",
353
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
354
+ "dueDate": "2025-10-27",
355
+ "knownRansomwareCampaignUse": "Unknown",
356
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43226 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43226",
357
+ "cwes": []
358
+ },
359
+ {
360
+ "cveID": "CVE-2013-3918",
361
+ "vendorProject": "Microsoft",
362
+ "product": "Windows",
363
+ "vulnerabilityName": "Microsoft Windows Out-of-Bounds Write Vulnerability",
364
+ "dateAdded": "2025-10-06",
365
+ "shortDescription": "Microsoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
366
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
367
+ "dueDate": "2025-10-27",
368
+ "knownRansomwareCampaignUse": "Unknown",
369
+ "notes": "https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2013\/ms13-090 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-3918",
370
+ "cwes": []
371
+ },
372
+ {
373
+ "cveID": "CVE-2011-3402",
374
+ "vendorProject": "Microsoft",
375
+ "product": "Windows",
376
+ "vulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability",
377
+ "dateAdded": "2025-10-06",
378
+ "shortDescription": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.",
379
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
380
+ "dueDate": "2025-10-27",
381
+ "knownRansomwareCampaignUse": "Unknown",
382
+ "notes": "https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2011\/ms11-087 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2011-3402",
383
+ "cwes": []
384
+ },
385
+ {
386
+ "cveID": "CVE-2010-3765",
387
+ "vendorProject": "Mozilla",
388
+ "product": "Multiple Products",
389
+ "vulnerabilityName": "Mozilla Multiple Products Remote Code Execution Vulnerability",
390
+ "dateAdded": "2025-10-06",
391
+ "shortDescription": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.",
392
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
393
+ "dueDate": "2025-10-27",
394
+ "knownRansomwareCampaignUse": "Unknown",
395
+ "notes": "https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2010-73 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-3765",
396
+ "cwes": []
397
+ },
398
+ {
399
+ "cveID": "CVE-2025-61882",
400
+ "vendorProject": "Oracle",
401
+ "product": "E-Business Suite",
402
+ "vulnerabilityName": "Oracle E-Business Suite Unspecified Vulnerability",
403
+ "dateAdded": "2025-10-06",
404
+ "shortDescription": "Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.",
405
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
406
+ "dueDate": "2025-10-27",
407
+ "knownRansomwareCampaignUse": "Known",
408
+ "notes": "https:\/\/www.oracle.com\/security-alerts\/alert-cve-2025-61882.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61882",
409
+ "cwes": []
410
+ },
411
+ {
412
+ "cveID": "CVE-2014-6278",
413
+ "vendorProject": "GNU",
414
+ "product": "GNU Bash",
415
+ "vulnerabilityName": "GNU Bash OS Command Injection Vulnerability",
416
+ "dateAdded": "2025-10-02",
417
+ "shortDescription": "GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.",
418
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. ",
419
+ "dueDate": "2025-10-23",
420
+ "knownRansomwareCampaignUse": "Unknown",
421
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http:\/\/ftp.gnu.org\/gnu\/bash\/bash-4.3-patches\/bash43-027 ; https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/23467 ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20140926-bash ; https:\/\/www.ibm.com\/support\/pages\/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6278",
422
+ "cwes": [
423
+ "CWE-78"
424
+ ]
425
+ },
426
+ {
427
+ "cveID": "CVE-2017-1000353",
428
+ "vendorProject": "Jenkins",
429
+ "product": "Jenkins",
430
+ "vulnerabilityName": "Jenkins Remote Code Execution Vulnerability",
431
+ "dateAdded": "2025-10-02",
432
+ "shortDescription": "Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.",
433
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
434
+ "dueDate": "2025-10-23",
435
+ "knownRansomwareCampaignUse": "Unknown",
436
+ "notes": "https:\/\/www.jenkins.io\/security\/advisory\/2017-04-26\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000353",
437
+ "cwes": []
438
+ },
439
+ {
440
+ "cveID": "CVE-2015-7755",
441
+ "vendorProject": "Juniper",
442
+ "product": "ScreenOS",
443
+ "vulnerabilityName": "Juniper ScreenOS Improper Authentication Vulnerability",
444
+ "dateAdded": "2025-10-02",
445
+ "shortDescription": "Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.",
446
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
447
+ "dueDate": "2025-10-23",
448
+ "knownRansomwareCampaignUse": "Unknown",
449
+ "notes": "https:\/\/supportportal.juniper.net\/s\/article\/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7755",
450
+ "cwes": [
451
+ "CWE-287"
452
+ ]
453
+ },
454
+ {
455
+ "cveID": "CVE-2025-21043",
456
+ "vendorProject": "Samsung",
457
+ "product": "Mobile Devices",
458
+ "vulnerabilityName": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability",
459
+ "dateAdded": "2025-10-02",
460
+ "shortDescription": "Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.",
461
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
462
+ "dueDate": "2025-10-23",
463
+ "knownRansomwareCampaignUse": "Unknown",
464
+ "notes": "https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&month=09 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21043",
465
+ "cwes": [
466
+ "CWE-787"
467
+ ]
468
+ },
469
+ {
470
+ "cveID": "CVE-2025-4008",
471
+ "vendorProject": "Smartbedded",
472
+ "product": "Meteobridge",
473
+ "vulnerabilityName": "Smartbedded Meteobridge Command Injection Vulnerability",
474
+ "dateAdded": "2025-10-02",
475
+ "shortDescription": "Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.",
476
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
477
+ "dueDate": "2025-10-23",
478
+ "knownRansomwareCampaignUse": "Unknown",
479
+ "notes": "https:\/\/forum.meteohub.de\/viewtopic.php?t=18687 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4008",
480
+ "cwes": [
481
+ "CWE-306",
482
+ "CWE-77"
483
+ ]
484
+ },
485
+ {
486
+ "cveID": "CVE-2025-32463",
487
+ "vendorProject": "Sudo",
488
+ "product": "Sudo",
489
+ "vulnerabilityName": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability",
490
+ "dateAdded": "2025-09-29",
491
+ "shortDescription": "Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo\u2019s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.",
492
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
493
+ "dueDate": "2025-10-20",
494
+ "knownRansomwareCampaignUse": "Unknown",
495
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/www.sudo.ws\/security\/advisories\/chroot_bug\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32463",
496
+ "cwes": [
497
+ "CWE-829"
498
+ ]
499
+ },
500
+ {
501
+ "cveID": "CVE-2025-59689",
502
+ "vendorProject": "Libraesva",
503
+ "product": "Email Security Gateway",
504
+ "vulnerabilityName": "Libraesva Email Security Gateway Command Injection Vulnerability",
505
+ "dateAdded": "2025-09-29",
506
+ "shortDescription": "Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.",
507
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
508
+ "dueDate": "2025-10-20",
509
+ "knownRansomwareCampaignUse": "Unknown",
510
+ "notes": "https:\/\/docs.libraesva.com\/knowledgebase\/security-advisory-command-injection-vulnerability-cve-2025-59689\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59689",
511
+ "cwes": [
512
+ "CWE-77"
513
+ ]
514
+ },
515
+ {
516
+ "cveID": "CVE-2025-10035",
517
+ "vendorProject": "Fortra",
518
+ "product": "GoAnywhere MFT",
519
+ "vulnerabilityName": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability",
520
+ "dateAdded": "2025-09-29",
521
+ "shortDescription": "Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.",
522
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
523
+ "dueDate": "2025-10-20",
524
+ "knownRansomwareCampaignUse": "Known",
525
+ "notes": "https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2025-012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035",
526
+ "cwes": [
527
+ "CWE-502",
528
+ "CWE-77"
529
+ ]
530
+ },
531
+ {
532
+ "cveID": "CVE-2025-20352",
533
+ "vendorProject": "Cisco",
534
+ "product": "IOS and IOS XE",
535
+ "vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
536
+ "dateAdded": "2025-09-29",
537
+ "shortDescription": "Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.",
538
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
539
+ "dueDate": "2025-10-20",
540
+ "knownRansomwareCampaignUse": "Unknown",
541
+ "notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-snmp-x4LPhte ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20352",
542
+ "cwes": [
543
+ "CWE-121"
544
+ ]
545
+ },
546
+ {
547
+ "cveID": "CVE-2021-21311",
548
+ "vendorProject": "Adminer",
549
+ "product": "Adminer",
550
+ "vulnerabilityName": "Adminer Server-Side Request Forgery Vulnerability",
551
+ "dateAdded": "2025-09-29",
552
+ "shortDescription": "Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.",
553
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
554
+ "dueDate": "2025-10-20",
555
+ "knownRansomwareCampaignUse": "Unknown",
556
+ "notes": "https:\/\/github.com\/vrana\/adminer\/security\/advisories\/GHSA-x5r2-hj5c-8jx6 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21311",
557
+ "cwes": [
558
+ "CWE-918"
559
+ ]
560
+ },
561
+ {
562
+ "cveID": "CVE-2025-20362",
563
+ "vendorProject": "Cisco",
564
+ "product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
565
+ "vulnerabilityName": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability",
566
+ "dateAdded": "2025-09-25",
567
+ "shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.",
568
+ "requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
569
+ "dueDate": "2025-09-26",
570
+ "knownRansomwareCampaignUse": "Unknown",
571
+ "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-YROOTUW ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20362",
572
+ "cwes": [
573
+ "CWE-862"
574
+ ]
575
+ },
576
+ {
577
+ "cveID": "CVE-2025-20333",
578
+ "vendorProject": "Cisco",
579
+ "product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
580
+ "vulnerabilityName": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability",
581
+ "dateAdded": "2025-09-25",
582
+ "shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.",
583
+ "requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
584
+ "dueDate": "2025-09-26",
585
+ "knownRansomwareCampaignUse": "Unknown",
586
+ "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-z5xP8EUB ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20333",
587
+ "cwes": [
588
+ "CWE-120"
589
+ ]
590
+ },
591
+ {
592
+ "cveID": "CVE-2025-10585",
593
+ "vendorProject": "Google",
594
+ "product": "Chromium V8",
595
+ "vulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
596
+ "dateAdded": "2025-09-23",
597
+ "shortDescription": "Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.",
598
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
599
+ "dueDate": "2025-10-14",
600
+ "knownRansomwareCampaignUse": "Unknown",
601
+ "notes": "https:\/\/chromereleases.googleblog.com\/2025\/09\/stable-channel-update-for-desktop_17.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10585",
602
+ "cwes": [
603
+ "CWE-843"
604
+ ]
605
+ },
606
+ {
607
+ "cveID": "CVE-2025-5086",
608
+ "vendorProject": "Dassault Syst\u00e8mes",
609
+ "product": "DELMIA Apriso",
610
+ "vulnerabilityName": "Dassault Syst\u00e8mes DELMIA Apriso Deserialization of Untrusted Data Vulnerability",
611
+ "dateAdded": "2025-09-11",
612
+ "shortDescription": "Dassault Syst\u00e8mes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution.",
613
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
614
+ "dueDate": "2025-10-02",
615
+ "knownRansomwareCampaignUse": "Unknown",
616
+ "notes": "https:\/\/www.3ds.com\/trust-center\/security\/security-advisories\/cve-2025-5086 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-5086",
617
+ "cwes": [
618
+ "CWE-502"
619
+ ]
620
+ },
621
+ {
622
+ "cveID": "CVE-2025-38352",
623
+ "vendorProject": "Linux",
624
+ "product": "Kernel",
625
+ "vulnerabilityName": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability",
626
+ "dateAdded": "2025-09-04",
627
+ "shortDescription": "Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.",
628
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
629
+ "dueDate": "2025-09-25",
630
+ "knownRansomwareCampaignUse": "Unknown",
631
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/?id=2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-38352",
632
+ "cwes": [
633
+ "CWE-367"
634
+ ]
635
+ },
636
+ {
637
+ "cveID": "CVE-2025-48543",
638
+ "vendorProject": "Android",
639
+ "product": "Runtime",
640
+ "vulnerabilityName": "Android Runtime Use-After-Free Vulnerability",
641
+ "dateAdded": "2025-09-04",
642
+ "shortDescription": "Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.",
643
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
644
+ "dueDate": "2025-09-25",
645
+ "knownRansomwareCampaignUse": "Unknown",
646
+ "notes": "https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48543",
647
+ "cwes": []
648
+ },
649
+ {
650
+ "cveID": "CVE-2025-53690",
651
+ "vendorProject": "Sitecore",
652
+ "product": "Multiple Products",
653
+ "vulnerabilityName": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability",
654
+ "dateAdded": "2025-09-04",
655
+ "shortDescription": "Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. ",
656
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
657
+ "dueDate": "2025-09-25",
658
+ "knownRansomwareCampaignUse": "Unknown",
659
+ "notes": "https:\/\/support.sitecore.com\/kb?id=kb_article_view&sysparm_article=KB1003865 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53690",
660
+ "cwes": [
661
+ "CWE-502"
662
+ ]
663
+ },
664
+ {
665
+ "cveID": "CVE-2023-50224",
666
+ "vendorProject": "TP-Link",
667
+ "product": "TL-WR841N",
668
+ "vulnerabilityName": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability",
669
+ "dateAdded": "2025-09-03",
670
+ "shortDescription": "TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
671
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
672
+ "dueDate": "2025-09-24",
673
+ "knownRansomwareCampaignUse": "Unknown",
674
+ "notes": "https:\/\/www.tp-link.com\/us\/support\/faq\/4308\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-50224",
675
+ "cwes": [
676
+ "CWE-290"
677
+ ]
678
+ },
679
+ {
680
+ "cveID": "CVE-2025-9377",
681
+ "vendorProject": "TP-Link",
682
+ "product": "Multiple Routers",
683
+ "vulnerabilityName": "TP-Link Archer C7(EU) and TL-WR841N\/ND(MS) OS Command Injection Vulnerability",
684
+ "dateAdded": "2025-09-03",
685
+ "shortDescription": "TP-Link Archer C7(EU) and TL-WR841N\/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
686
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
687
+ "dueDate": "2025-09-24",
688
+ "knownRansomwareCampaignUse": "Unknown",
689
+ "notes": "https:\/\/www.tp-link.com\/us\/support\/faq\/4308\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-9377",
690
+ "cwes": [
691
+ "CWE-78"
692
+ ]
693
+ },
694
+ {
695
+ "cveID": "CVE-2020-24363",
696
+ "vendorProject": "TP-Link",
697
+ "product": "TL-WA855RE",
698
+ "vulnerabilityName": "TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability",
699
+ "dateAdded": "2025-09-02",
700
+ "shortDescription": "TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
701
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
702
+ "dueDate": "2025-09-23",
703
+ "knownRansomwareCampaignUse": "Unknown",
704
+ "notes": "https:\/\/www.tp-link.com\/us\/home-networking\/range-extender\/tl-wa855re\/#overview ; https:\/\/www.tp-link.com\/us\/support\/download\/tl-wa855re\/#FAQs ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24363",
705
+ "cwes": [
706
+ "CWE-306"
707
+ ]
708
+ },
709
+ {
710
+ "cveID": "CVE-2025-55177",
711
+ "vendorProject": "Meta Platforms",
712
+ "product": "WhatsApp",
713
+ "vulnerabilityName": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability",
714
+ "dateAdded": "2025-09-02",
715
+ "shortDescription": "Meta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target\u2019s device.",
716
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
717
+ "dueDate": "2025-09-23",
718
+ "knownRansomwareCampaignUse": "Unknown",
719
+ "notes": "https:\/\/www.whatsapp.com\/security\/advisories\/2025\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-55177",
720
+ "cwes": [
721
+ "CWE-863"
722
+ ]
723
+ },
724
+ {
725
+ "cveID": "CVE-2025-57819",
726
+ "vendorProject": "Sangoma",
727
+ "product": "FreePBX",
728
+ "vulnerabilityName": "Sangoma FreePBX Authentication Bypass Vulnerability",
729
+ "dateAdded": "2025-08-29",
730
+ "shortDescription": "Sangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.",
731
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
732
+ "dueDate": "2025-09-19",
733
+ "knownRansomwareCampaignUse": "Unknown",
734
+ "notes": "https:\/\/github.com\/FreePBX\/security-reporting\/security\/advisories\/GHSA-m42g-xg4c-5f3h ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-57819",
735
+ "cwes": [
736
+ "CWE-89",
737
+ "CWE-288"
738
+ ]
739
+ },
740
+ {
741
+ "cveID": "CVE-2025-7775",
742
+ "vendorProject": "Citrix",
743
+ "product": "NetScaler",
744
+ "vulnerabilityName": "Citrix NetScaler Memory Overflow Vulnerability",
745
+ "dateAdded": "2025-08-26",
746
+ "shortDescription": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and\/or denial of service.",
747
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
748
+ "dueDate": "2025-08-28",
749
+ "knownRansomwareCampaignUse": "Unknown",
750
+ "notes": "https:\/\/support.citrix.com\/support-home\/kbsearch\/article?articleNumber=CTX694938 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-7775",
751
+ "cwes": [
752
+ "CWE-119"
753
+ ]
754
+ },
755
+ {
756
+ "cveID": "CVE-2025-48384",
757
+ "vendorProject": "Git",
758
+ "product": "Git",
759
+ "vulnerabilityName": "Git Link Following Vulnerability",
760
+ "dateAdded": "2025-08-25",
761
+ "shortDescription": "Git contains a link following vulnerability that stems from Git\u2019s inconsistent handling of carriage return characters in configuration files.",
762
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
763
+ "dueDate": "2025-09-15",
764
+ "knownRansomwareCampaignUse": "Unknown",
765
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/github.com\/git\/git\/security\/advisories\/GHSA-vwqx-4fm8-6qc9 ; https:\/\/access.redhat.com\/errata\/RHSA-2025:13933 ; https:\/\/alas.aws.amazon.com\/AL2\/ALAS2-2025-2941.html ; https:\/\/linux.oracle.com\/errata\/ELSA-2025-11534.html ; https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-48384 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48384",
766
+ "cwes": [
767
+ "CWE-59",
768
+ "CWE-436"
769
+ ]
770
+ },
771
+ {
772
+ "cveID": "CVE-2024-8068",
773
+ "vendorProject": "Citrix",
774
+ "product": "Session Recording",
775
+ "vulnerabilityName": "Citrix Session Recording Improper Privilege Management Vulnerability",
776
+ "dateAdded": "2025-08-25",
777
+ "shortDescription": "Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.",
778
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
779
+ "dueDate": "2025-09-15",
780
+ "knownRansomwareCampaignUse": "Unknown",
781
+ "notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8068",
782
+ "cwes": [
783
+ "CWE-269"
784
+ ]
785
+ },
786
+ {
787
+ "cveID": "CVE-2024-8069",
788
+ "vendorProject": "Citrix",
789
+ "product": "Session Recording",
790
+ "vulnerabilityName": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability",
791
+ "dateAdded": "2025-08-25",
792
+ "shortDescription": "Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.",
793
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
794
+ "dueDate": "2025-09-15",
795
+ "knownRansomwareCampaignUse": "Unknown",
796
+ "notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8069",
797
+ "cwes": [
798
+ "CWE-502"
799
+ ]
800
+ },
7
801
  {
8
802
  "cveID": "CVE-2025-43300",
9
803
  "vendorProject": "Apple",
@@ -2249,7 +3043,7 @@
2249
3043
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
2250
3044
  "dueDate": "2025-02-13",
2251
3045
  "knownRansomwareCampaignUse": "Unknown",
2252
- "notes": "https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
3046
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/jquery\/jquery\/security\/advisories\/GHSA-jpcq-cgw6-v4j6 ; https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
2253
3047
  "cwes": [
2254
3048
  "CWE-79"
2255
3049
  ]
@@ -2755,7 +3549,7 @@
2755
3549
  "shortDescription": "Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.",
2756
3550
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.",
2757
3551
  "dueDate": "2024-12-09",
2758
- "knownRansomwareCampaignUse": "Unknown",
3552
+ "knownRansomwareCampaignUse": "Known",
2759
3553
  "notes": "https:\/\/security.paloaltonetworks.com\/CVE-2024-9474 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9474",
2760
3554
  "cwes": [
2761
3555
  "CWE-77"
@@ -4246,7 +5040,7 @@
4246
5040
  "shortDescription": "Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.",
4247
5041
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
4248
5042
  "dueDate": "2024-06-20",
4249
- "knownRansomwareCampaignUse": "Unknown",
5043
+ "knownRansomwareCampaignUse": "Known",
4250
5044
  "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-1086",
4251
5045
  "cwes": [
4252
5046
  "CWE-416"
@@ -4815,7 +5609,7 @@
4815
5609
  "shortDescription": "Microsoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass.",
4816
5610
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
4817
5611
  "dueDate": "2024-03-05",
4818
- "knownRansomwareCampaignUse": "Unknown",
5612
+ "knownRansomwareCampaignUse": "Known",
4819
5613
  "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21412; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21412",
4820
5614
  "cwes": [
4821
5615
  "CWE-693"
@@ -4905,8 +5699,8 @@
4905
5699
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.",
4906
5700
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
4907
5701
  "dueDate": "2024-02-02",
4908
- "knownRansomwareCampaignUse": "Unknown",
4909
- "notes": "https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21893",
5702
+ "knownRansomwareCampaignUse": "Known",
5703
+ "notes": "https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21893",
4910
5704
  "cwes": [
4911
5705
  "CWE-918"
4912
5706
  ]
@@ -5055,7 +5849,7 @@
5055
5849
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.",
5056
5850
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5057
5851
  "dueDate": "2024-01-22",
5058
- "knownRansomwareCampaignUse": "Unknown",
5852
+ "knownRansomwareCampaignUse": "Known",
5059
5853
  "notes": "Please apply mitigations per vendor instructions. For more information, please see: https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-46805",
5060
5854
  "cwes": [
5061
5855
  "CWE-287"
@@ -5070,7 +5864,7 @@
5070
5864
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue.",
5071
5865
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5072
5866
  "dueDate": "2024-01-22",
5073
- "knownRansomwareCampaignUse": "Unknown",
5867
+ "knownRansomwareCampaignUse": "Known",
5074
5868
  "notes": "Please apply mitigations per vendor instructions. For more information, please see: https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21887",
5075
5869
  "cwes": [
5076
5870
  "CWE-77"