regscale-cli 6.23.0.0__py3-none-any.whl → 6.23.0.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

regscale/_version.py CHANGED
@@ -33,7 +33,7 @@ def get_version_from_pyproject() -> str:
33
33
  return match.group(1)
34
34
  except Exception:
35
35
  pass
36
- return "6.23.0.0" # fallback version
36
+ return "6.23.0.1" # fallback version
37
37
 
38
38
 
39
39
  __version__ = get_version_from_pyproject()
@@ -1,9 +1,52 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.09.03",
4
- "dateReleased": "2025-09-03T17:00:44.122Z",
5
- "count": 1410,
3
+ "catalogVersion": "2025.09.04",
4
+ "dateReleased": "2025-09-04T18:50:12.4837Z",
5
+ "count": 1413,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-38352",
9
+ "vendorProject": "Linux",
10
+ "product": "Kernel",
11
+ "vulnerabilityName": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability",
12
+ "dateAdded": "2025-09-04",
13
+ "shortDescription": "Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-09-25",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/?id=2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-38352",
18
+ "cwes": [
19
+ "CWE-367"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2025-48543",
24
+ "vendorProject": "Android",
25
+ "product": "Runtime",
26
+ "vulnerabilityName": "Android Runtime Use-After-Free Vulnerability",
27
+ "dateAdded": "2025-09-04",
28
+ "shortDescription": "Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-09-25",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48543",
33
+ "cwes": []
34
+ },
35
+ {
36
+ "cveID": "CVE-2025-53690",
37
+ "vendorProject": "Sitecore",
38
+ "product": "Multiple Products",
39
+ "vulnerabilityName": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability",
40
+ "dateAdded": "2025-09-04",
41
+ "shortDescription": "Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. ",
42
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
43
+ "dueDate": "2025-09-25",
44
+ "knownRansomwareCampaignUse": "Unknown",
45
+ "notes": "https:\/\/support.sitecore.com\/kb?id=kb_article_view&sysparm_article=KB1003865 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53690",
46
+ "cwes": [
47
+ "CWE-502"
48
+ ]
49
+ },
7
50
  {
8
51
  "cveID": "CVE-2023-50224",
9
52
  "vendorProject": "TP-Link",
@@ -80,10 +80,10 @@ class Vulnerabilities(SynqlyModel):
80
80
  if kwargs.get("all_scans"):
81
81
  vuln_filter.append("finding.last_seen_time[gte]915148800") # Friday, January 1, 1999 12:00:00 AM UTC
82
82
  elif scan_date := kwargs.get("scan_date"):
83
- from regscale.core.utils.date import date_obj
83
+ from regscale.core.utils.date import datetime_obj
84
84
 
85
- if scan_date := date_obj(scan_date):
86
- vuln_filter.append(f"finding.last_seen_time[gte]{scan_date.isoformat()}")
85
+ if scan_date := datetime_obj(scan_date):
86
+ vuln_filter.append(f"finding.last_seen_time[gte]{int(scan_date.timestamp())}")
87
87
  else:
88
88
  vuln_filter.append(f"finding.last_seen_time[gte]{get_last_pull_epoch(regscale_ssp_id)}")
89
89
  else:
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: regscale-cli
3
- Version: 6.23.0.0
3
+ Version: 6.23.0.1
4
4
  Summary: Command Line Interface (CLI) for bulk processing/loading data into RegScale
5
5
  Home-page: https://github.com/RegScale/regscale-cli
6
6
  Author: Travis Howerton
@@ -1,5 +1,5 @@
1
1
  regscale/__init__.py,sha256=ZygAIkX6Nbjag1czWdQa-yP-GM1mBE_9ss21Xh__JFc,34
2
- regscale/_version.py,sha256=WCBjfKcCkvP_rge5Txea03DdGp8t8G4D7ysVpze60LM,1198
2
+ regscale/_version.py,sha256=Mku5ht7lyCiemlkIWEVOkysCBvU2e_x0jj0Zgh_CJBg,1198
3
3
  regscale/regscale.py,sha256=Lfjztf_bYITfITh830v1ENkrj5ZBDbNinygsUxGdh7o,31116
4
4
  regscale/airflow/__init__.py,sha256=yMwN0Bz4JbM0nl5qY_hPegxo_O2ilhTOL9PY5Njhn-s,270
5
5
  regscale/airflow/click_dags.py,sha256=H3SUR5jkvInNMv1gu-VG-Ja_H-kH145CpQYNalWNAbE,4520
@@ -322,7 +322,7 @@ regscale/models/integration_models/azure_alerts.py,sha256=2etrpvcxa7jVQrc98bJlVG
322
322
  regscale/models/integration_models/base64.py,sha256=sxV6O5qY1_TstJENX5jBPsSdQwmA83-NNhgJFunXiZE,570
323
323
  regscale/models/integration_models/burp.py,sha256=FBEBkH3U0Q8vq71FFoWnvgLRF5Hkr9GYmQFmNNHFrVk,16932
324
324
  regscale/models/integration_models/burp_models.py,sha256=UytDTAcCaxyu-knFkm_mEUH6UmWK3OTXKSC9Sc6OjVs,3669
325
- regscale/models/integration_models/cisa_kev_data.json,sha256=UVI0CQadIoComCdjuIs5wUsNCZ6ARdpQv1_7W439Qn8,1264242
325
+ regscale/models/integration_models/cisa_kev_data.json,sha256=qnYluZ5IXbQIk_tqDPRyFzcJUSgX7gQPJeBByg3YRdg,1267609
326
326
  regscale/models/integration_models/defender_data.py,sha256=jsAcjKxiGmumGerj7xSWkFd6r__YpuKDnYX5o7xHDiE,2844
327
327
  regscale/models/integration_models/defenderimport.py,sha256=Ze4kgwns-IYPyO7sBjEzW8PXWlxwU-DAo2fIyRcTC3k,6242
328
328
  regscale/models/integration_models/drf.py,sha256=Aq7AdLa_CH97NrnR-CxaFI22JjVN9uCxVN7Z-BBUaNU,18896
@@ -363,7 +363,7 @@ regscale/models/integration_models/synqly_models/connectors/__init__.py,sha256=J
363
363
  regscale/models/integration_models/synqly_models/connectors/assets.py,sha256=HHNIAVh5pRuJe8sStqhFEc6VnX2wT0FcY5178nbQgkQ,3705
364
364
  regscale/models/integration_models/synqly_models/connectors/edr.py,sha256=kio3uoEYubCHretpDOJqxdwmzid1IzbVYz0BF64zeL0,5547
365
365
  regscale/models/integration_models/synqly_models/connectors/ticketing.py,sha256=yRBuCkRAVfa_C91r3WqJ9gxrQsoD0qV9cY48YXpJl70,25358
366
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=NzsaaBuuL8mCxOgUGhA7eqvrc398l_3cJSJgv0WVF4s,7180
366
+ regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=jebBkFy6KspZMVGkmLWQm8-enAUsjRJ6z3pM6Wg0Qv0,7193
367
367
  regscale/models/integration_models/tenable_models/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
368
368
  regscale/models/integration_models/tenable_models/integration.py,sha256=lplL8zmjTFuhLreW-4y7G1fiCOBgzNAaATq800jgTQc,10271
369
369
  regscale/models/integration_models/tenable_models/models.py,sha256=dmG7btkN4YkDWwnfW5Ldc3tWEAGjPiaRgJjrqMOkPEU,15846
@@ -536,9 +536,9 @@ tests/regscale/models/test_regscale_model.py,sha256=ZsrEZkC4EtdIsoQuayn1xv2gEGcV
536
536
  tests/regscale/models/test_report.py,sha256=IqUq7C__a1_q_mLaz0PE9Lq6fHggBsB14-AzEYNBxLw,4666
537
537
  tests/regscale/models/test_tenable_integrations.py,sha256=y1qaW77H094VSGHjZdlvF66UCt-nPEib9Mv3cdwbM94,32435
538
538
  tests/regscale/models/test_user_model.py,sha256=e9olv28qBApgnvK6hFHOgXjUC-pkaV8aGDirEIWASL4,4427
539
- regscale_cli-6.23.0.0.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
540
- regscale_cli-6.23.0.0.dist-info/METADATA,sha256=cjr3qeaYzjy47S7c4z4l7daXTpF92UldmmYpIJb83F8,35027
541
- regscale_cli-6.23.0.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
542
- regscale_cli-6.23.0.0.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
543
- regscale_cli-6.23.0.0.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
544
- regscale_cli-6.23.0.0.dist-info/RECORD,,
539
+ regscale_cli-6.23.0.1.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
540
+ regscale_cli-6.23.0.1.dist-info/METADATA,sha256=Azl8HLkijxLJeJGbRq4JcDLrsW-AGIOaW5m3o2GjmEA,35027
541
+ regscale_cli-6.23.0.1.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
542
+ regscale_cli-6.23.0.1.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
543
+ regscale_cli-6.23.0.1.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
544
+ regscale_cli-6.23.0.1.dist-info/RECORD,,