regscale-cli 6.21.2.2__py3-none-any.whl → 6.22.0.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/core/app/application.py +3 -0
- regscale/core/app/utils/app_utils.py +31 -0
- regscale/integrations/commercial/jira.py +27 -5
- regscale/integrations/commercial/qualys/__init__.py +160 -60
- regscale/integrations/commercial/qualys/scanner.py +300 -39
- regscale/integrations/commercial/synqly/edr.py +2 -8
- regscale/integrations/commercial/wizv2/async_client.py +4 -0
- regscale/integrations/commercial/wizv2/scanner.py +50 -24
- regscale/integrations/public/__init__.py +13 -0
- regscale/integrations/public/csam/__init__.py +0 -0
- regscale/integrations/public/csam/csam.py +1129 -0
- regscale/integrations/public/fedramp/fedramp_cis_crm.py +175 -51
- regscale/integrations/scanner_integration.py +513 -145
- regscale/models/integration_models/cisa_kev_data.json +64 -3
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/regscale_models/__init__.py +2 -0
- regscale/models/regscale_models/catalog.py +1 -1
- regscale/models/regscale_models/control_implementation.py +8 -8
- regscale/models/regscale_models/form_field_value.py +5 -3
- regscale/models/regscale_models/inheritance.py +44 -0
- regscale/regscale.py +2 -0
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/METADATA +1 -1
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/RECORD +29 -29
- tests/regscale/models/test_tenable_integrations.py +811 -105
- regscale/integrations/public/fedramp/mappings/fedramp_r4_parts.json +0 -7388
- regscale/integrations/public/fedramp/mappings/fedramp_r5_parts.json +0 -9605
- regscale/integrations/public/fedramp/parts_mapper.py +0 -107
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.21.2.2.dist-info → regscale_cli-6.22.0.1.dist-info}/top_level.txt +0 -0
|
@@ -1,9 +1,70 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.
|
|
4
|
-
"dateReleased": "2025-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.09.02",
|
|
4
|
+
"dateReleased": "2025-09-02T14:00:03.8096Z",
|
|
5
|
+
"count": 1408,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2020-24363",
|
|
9
|
+
"vendorProject": "TP-Link",
|
|
10
|
+
"product": "TL-WA855RE",
|
|
11
|
+
"vulnerabilityName": "TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability",
|
|
12
|
+
"dateAdded": "2025-09-02",
|
|
13
|
+
"shortDescription": "TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-09-23",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "https:\/\/www.tp-link.com\/us\/home-networking\/range-extender\/tl-wa855re\/#overview ; https:\/\/www.tp-link.com\/us\/support\/download\/tl-wa855re\/#FAQs ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24363",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-306"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2025-55177",
|
|
24
|
+
"vendorProject": "Meta Platforms",
|
|
25
|
+
"product": "WhatsApp",
|
|
26
|
+
"vulnerabilityName": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability",
|
|
27
|
+
"dateAdded": "2025-09-02",
|
|
28
|
+
"shortDescription": "Meta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target\u2019s device.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-09-23",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/www.whatsapp.com\/security\/advisories\/2025\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-55177",
|
|
33
|
+
"cwes": [
|
|
34
|
+
"CWE-863"
|
|
35
|
+
]
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
"cveID": "CVE-2025-57819",
|
|
39
|
+
"vendorProject": "Sangoma",
|
|
40
|
+
"product": "FreePBX",
|
|
41
|
+
"vulnerabilityName": "Sangoma FreePBX Authentication Bypass Vulnerability",
|
|
42
|
+
"dateAdded": "2025-08-29",
|
|
43
|
+
"shortDescription": "Sangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.",
|
|
44
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
45
|
+
"dueDate": "2025-09-19",
|
|
46
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
47
|
+
"notes": "https:\/\/github.com\/FreePBX\/security-reporting\/security\/advisories\/GHSA-m42g-xg4c-5f3h ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-57819",
|
|
48
|
+
"cwes": [
|
|
49
|
+
"CWE-89",
|
|
50
|
+
"CWE-288"
|
|
51
|
+
]
|
|
52
|
+
},
|
|
53
|
+
{
|
|
54
|
+
"cveID": "CVE-2025-7775",
|
|
55
|
+
"vendorProject": "Citrix",
|
|
56
|
+
"product": "NetScaler",
|
|
57
|
+
"vulnerabilityName": "Citrix NetScaler Memory Overflow Vulnerability",
|
|
58
|
+
"dateAdded": "2025-08-26",
|
|
59
|
+
"shortDescription": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and\/or denial of service.",
|
|
60
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
61
|
+
"dueDate": "2025-08-28",
|
|
62
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
63
|
+
"notes": "https:\/\/support.citrix.com\/support-home\/kbsearch\/article?articleNumber=CTX694938 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-7775",
|
|
64
|
+
"cwes": [
|
|
65
|
+
"CWE-119"
|
|
66
|
+
]
|
|
67
|
+
},
|
|
7
68
|
{
|
|
8
69
|
"cveID": "CVE-2025-48384",
|
|
9
70
|
"vendorProject": "Git",
|