regscale-cli 6.23.0.0__py3-none-any.whl → 6.23.0.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/models/integration_models/cisa_kev_data.json +46 -3
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +3 -3
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/METADATA +1 -1
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/RECORD +9 -9
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.23.0.0.dist-info → regscale_cli-6.23.0.1.dist-info}/top_level.txt +0 -0
regscale/_version.py
CHANGED
|
@@ -1,9 +1,52 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.09.
|
|
4
|
-
"dateReleased": "2025-09-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.09.04",
|
|
4
|
+
"dateReleased": "2025-09-04T18:50:12.4837Z",
|
|
5
|
+
"count": 1413,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-38352",
|
|
9
|
+
"vendorProject": "Linux",
|
|
10
|
+
"product": "Kernel",
|
|
11
|
+
"vulnerabilityName": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability",
|
|
12
|
+
"dateAdded": "2025-09-04",
|
|
13
|
+
"shortDescription": "Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-09-25",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/?id=2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-38352",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-367"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2025-48543",
|
|
24
|
+
"vendorProject": "Android",
|
|
25
|
+
"product": "Runtime",
|
|
26
|
+
"vulnerabilityName": "Android Runtime Use-After-Free Vulnerability",
|
|
27
|
+
"dateAdded": "2025-09-04",
|
|
28
|
+
"shortDescription": "Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-09-25",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48543",
|
|
33
|
+
"cwes": []
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"cveID": "CVE-2025-53690",
|
|
37
|
+
"vendorProject": "Sitecore",
|
|
38
|
+
"product": "Multiple Products",
|
|
39
|
+
"vulnerabilityName": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability",
|
|
40
|
+
"dateAdded": "2025-09-04",
|
|
41
|
+
"shortDescription": "Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. ",
|
|
42
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
43
|
+
"dueDate": "2025-09-25",
|
|
44
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
45
|
+
"notes": "https:\/\/support.sitecore.com\/kb?id=kb_article_view&sysparm_article=KB1003865 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53690",
|
|
46
|
+
"cwes": [
|
|
47
|
+
"CWE-502"
|
|
48
|
+
]
|
|
49
|
+
},
|
|
7
50
|
{
|
|
8
51
|
"cveID": "CVE-2023-50224",
|
|
9
52
|
"vendorProject": "TP-Link",
|
|
@@ -80,10 +80,10 @@ class Vulnerabilities(SynqlyModel):
|
|
|
80
80
|
if kwargs.get("all_scans"):
|
|
81
81
|
vuln_filter.append("finding.last_seen_time[gte]915148800") # Friday, January 1, 1999 12:00:00 AM UTC
|
|
82
82
|
elif scan_date := kwargs.get("scan_date"):
|
|
83
|
-
from regscale.core.utils.date import
|
|
83
|
+
from regscale.core.utils.date import datetime_obj
|
|
84
84
|
|
|
85
|
-
if scan_date :=
|
|
86
|
-
vuln_filter.append(f"finding.last_seen_time[gte]{scan_date.
|
|
85
|
+
if scan_date := datetime_obj(scan_date):
|
|
86
|
+
vuln_filter.append(f"finding.last_seen_time[gte]{int(scan_date.timestamp())}")
|
|
87
87
|
else:
|
|
88
88
|
vuln_filter.append(f"finding.last_seen_time[gte]{get_last_pull_epoch(regscale_ssp_id)}")
|
|
89
89
|
else:
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
regscale/__init__.py,sha256=ZygAIkX6Nbjag1czWdQa-yP-GM1mBE_9ss21Xh__JFc,34
|
|
2
|
-
regscale/_version.py,sha256=
|
|
2
|
+
regscale/_version.py,sha256=Mku5ht7lyCiemlkIWEVOkysCBvU2e_x0jj0Zgh_CJBg,1198
|
|
3
3
|
regscale/regscale.py,sha256=Lfjztf_bYITfITh830v1ENkrj5ZBDbNinygsUxGdh7o,31116
|
|
4
4
|
regscale/airflow/__init__.py,sha256=yMwN0Bz4JbM0nl5qY_hPegxo_O2ilhTOL9PY5Njhn-s,270
|
|
5
5
|
regscale/airflow/click_dags.py,sha256=H3SUR5jkvInNMv1gu-VG-Ja_H-kH145CpQYNalWNAbE,4520
|
|
@@ -322,7 +322,7 @@ regscale/models/integration_models/azure_alerts.py,sha256=2etrpvcxa7jVQrc98bJlVG
|
|
|
322
322
|
regscale/models/integration_models/base64.py,sha256=sxV6O5qY1_TstJENX5jBPsSdQwmA83-NNhgJFunXiZE,570
|
|
323
323
|
regscale/models/integration_models/burp.py,sha256=FBEBkH3U0Q8vq71FFoWnvgLRF5Hkr9GYmQFmNNHFrVk,16932
|
|
324
324
|
regscale/models/integration_models/burp_models.py,sha256=UytDTAcCaxyu-knFkm_mEUH6UmWK3OTXKSC9Sc6OjVs,3669
|
|
325
|
-
regscale/models/integration_models/cisa_kev_data.json,sha256=
|
|
325
|
+
regscale/models/integration_models/cisa_kev_data.json,sha256=qnYluZ5IXbQIk_tqDPRyFzcJUSgX7gQPJeBByg3YRdg,1267609
|
|
326
326
|
regscale/models/integration_models/defender_data.py,sha256=jsAcjKxiGmumGerj7xSWkFd6r__YpuKDnYX5o7xHDiE,2844
|
|
327
327
|
regscale/models/integration_models/defenderimport.py,sha256=Ze4kgwns-IYPyO7sBjEzW8PXWlxwU-DAo2fIyRcTC3k,6242
|
|
328
328
|
regscale/models/integration_models/drf.py,sha256=Aq7AdLa_CH97NrnR-CxaFI22JjVN9uCxVN7Z-BBUaNU,18896
|
|
@@ -363,7 +363,7 @@ regscale/models/integration_models/synqly_models/connectors/__init__.py,sha256=J
|
|
|
363
363
|
regscale/models/integration_models/synqly_models/connectors/assets.py,sha256=HHNIAVh5pRuJe8sStqhFEc6VnX2wT0FcY5178nbQgkQ,3705
|
|
364
364
|
regscale/models/integration_models/synqly_models/connectors/edr.py,sha256=kio3uoEYubCHretpDOJqxdwmzid1IzbVYz0BF64zeL0,5547
|
|
365
365
|
regscale/models/integration_models/synqly_models/connectors/ticketing.py,sha256=yRBuCkRAVfa_C91r3WqJ9gxrQsoD0qV9cY48YXpJl70,25358
|
|
366
|
-
regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=
|
|
366
|
+
regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=jebBkFy6KspZMVGkmLWQm8-enAUsjRJ6z3pM6Wg0Qv0,7193
|
|
367
367
|
regscale/models/integration_models/tenable_models/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
368
368
|
regscale/models/integration_models/tenable_models/integration.py,sha256=lplL8zmjTFuhLreW-4y7G1fiCOBgzNAaATq800jgTQc,10271
|
|
369
369
|
regscale/models/integration_models/tenable_models/models.py,sha256=dmG7btkN4YkDWwnfW5Ldc3tWEAGjPiaRgJjrqMOkPEU,15846
|
|
@@ -536,9 +536,9 @@ tests/regscale/models/test_regscale_model.py,sha256=ZsrEZkC4EtdIsoQuayn1xv2gEGcV
|
|
|
536
536
|
tests/regscale/models/test_report.py,sha256=IqUq7C__a1_q_mLaz0PE9Lq6fHggBsB14-AzEYNBxLw,4666
|
|
537
537
|
tests/regscale/models/test_tenable_integrations.py,sha256=y1qaW77H094VSGHjZdlvF66UCt-nPEib9Mv3cdwbM94,32435
|
|
538
538
|
tests/regscale/models/test_user_model.py,sha256=e9olv28qBApgnvK6hFHOgXjUC-pkaV8aGDirEIWASL4,4427
|
|
539
|
-
regscale_cli-6.23.0.
|
|
540
|
-
regscale_cli-6.23.0.
|
|
541
|
-
regscale_cli-6.23.0.
|
|
542
|
-
regscale_cli-6.23.0.
|
|
543
|
-
regscale_cli-6.23.0.
|
|
544
|
-
regscale_cli-6.23.0.
|
|
539
|
+
regscale_cli-6.23.0.1.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
|
|
540
|
+
regscale_cli-6.23.0.1.dist-info/METADATA,sha256=Azl8HLkijxLJeJGbRq4JcDLrsW-AGIOaW5m3o2GjmEA,35027
|
|
541
|
+
regscale_cli-6.23.0.1.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
|
|
542
|
+
regscale_cli-6.23.0.1.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
|
|
543
|
+
regscale_cli-6.23.0.1.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
|
|
544
|
+
regscale_cli-6.23.0.1.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|