regscale-cli 6.25.0.1__py3-none-any.whl → 6.26.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

Files changed (84) hide show
  1. regscale/_version.py +1 -1
  2. regscale/airflow/hierarchy.py +2 -2
  3. regscale/core/app/application.py +18 -3
  4. regscale/core/app/internal/login.py +0 -1
  5. regscale/core/app/utils/catalog_utils/common.py +1 -1
  6. regscale/integrations/commercial/sicura/api.py +14 -13
  7. regscale/integrations/commercial/sicura/commands.py +8 -2
  8. regscale/integrations/commercial/sicura/scanner.py +49 -39
  9. regscale/integrations/commercial/stigv2/ckl_parser.py +5 -5
  10. regscale/integrations/commercial/synqly/assets.py +17 -0
  11. regscale/integrations/commercial/wizv2/click.py +26 -26
  12. regscale/integrations/commercial/wizv2/compliance_report.py +152 -157
  13. regscale/integrations/commercial/wizv2/constants.py +20 -71
  14. regscale/integrations/commercial/wizv2/scanner.py +3 -3
  15. regscale/integrations/compliance_integration.py +67 -2
  16. regscale/integrations/control_matcher.py +358 -0
  17. regscale/integrations/due_date_handler.py +118 -6
  18. regscale/integrations/milestone_manager.py +291 -0
  19. regscale/integrations/public/__init__.py +1 -0
  20. regscale/integrations/public/cci_importer.py +37 -38
  21. regscale/integrations/public/fedramp/click.py +60 -2
  22. regscale/integrations/public/fedramp/poam_export_v5.py +888 -0
  23. regscale/integrations/scanner_integration.py +199 -130
  24. regscale/models/integration_models/cisa_kev_data.json +199 -4
  25. regscale/models/integration_models/nexpose.py +36 -10
  26. regscale/models/integration_models/synqly_models/capabilities.json +1 -1
  27. regscale/models/locking.py +12 -8
  28. regscale/models/platform.py +1 -2
  29. regscale/models/regscale_models/control_implementation.py +46 -21
  30. regscale/models/regscale_models/issue.py +256 -94
  31. regscale/models/regscale_models/milestone.py +1 -1
  32. regscale/models/regscale_models/regscale_model.py +6 -1
  33. regscale/templates/__init__.py +0 -0
  34. regscale/utils/threading/threadhandler.py +20 -15
  35. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/METADATA +1 -1
  36. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/RECORD +84 -37
  37. tests/regscale/integrations/commercial/__init__.py +0 -0
  38. tests/regscale/integrations/commercial/conftest.py +28 -0
  39. tests/regscale/integrations/commercial/microsoft_defender/__init__.py +1 -0
  40. tests/regscale/integrations/commercial/microsoft_defender/test_defender.py +1517 -0
  41. tests/regscale/integrations/commercial/microsoft_defender/test_defender_api.py +1748 -0
  42. tests/regscale/integrations/commercial/microsoft_defender/test_defender_constants.py +327 -0
  43. tests/regscale/integrations/commercial/microsoft_defender/test_defender_scanner.py +487 -0
  44. tests/regscale/integrations/commercial/test_aws.py +3731 -0
  45. tests/regscale/integrations/commercial/test_burp.py +48 -0
  46. tests/regscale/integrations/commercial/test_crowdstrike.py +49 -0
  47. tests/regscale/integrations/commercial/test_dependabot.py +341 -0
  48. tests/regscale/integrations/commercial/test_gcp.py +1543 -0
  49. tests/regscale/integrations/commercial/test_gitlab.py +549 -0
  50. tests/regscale/integrations/commercial/test_ip_mac_address_length.py +84 -0
  51. tests/regscale/integrations/commercial/test_jira.py +1814 -0
  52. tests/regscale/integrations/commercial/test_npm_audit.py +42 -0
  53. tests/regscale/integrations/commercial/test_okta.py +1228 -0
  54. tests/regscale/integrations/commercial/test_sarif_converter.py +251 -0
  55. tests/regscale/integrations/commercial/test_sicura.py +350 -0
  56. tests/regscale/integrations/commercial/test_snow.py +423 -0
  57. tests/regscale/integrations/commercial/test_sonarcloud.py +394 -0
  58. tests/regscale/integrations/commercial/test_sqlserver.py +186 -0
  59. tests/regscale/integrations/commercial/test_stig.py +33 -0
  60. tests/regscale/integrations/commercial/test_stig_mapper.py +153 -0
  61. tests/regscale/integrations/commercial/test_stigv2.py +406 -0
  62. tests/regscale/integrations/commercial/test_wiz.py +1469 -0
  63. tests/regscale/integrations/commercial/test_wiz_inventory.py +256 -0
  64. tests/regscale/integrations/commercial/wizv2/__init__.py +339 -0
  65. tests/regscale/integrations/commercial/wizv2/test_compliance_report_normalization.py +138 -0
  66. tests/regscale/integrations/commercial/wizv2/test_issue.py +343 -0
  67. tests/regscale/integrations/commercial/wizv2/test_wiz_click_client_id.py +165 -0
  68. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_report.py +1351 -0
  69. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_unit.py +341 -0
  70. tests/regscale/integrations/commercial/wizv2/test_wiz_control_normalization.py +138 -0
  71. tests/regscale/integrations/commercial/wizv2/test_wiz_policy_compliance.py +750 -0
  72. tests/regscale/integrations/commercial/wizv2/test_wiz_status_mapping.py +149 -0
  73. tests/regscale/integrations/commercial/wizv2/test_wizv2.py +264 -0
  74. tests/regscale/integrations/commercial/wizv2/test_wizv2_utils.py +624 -0
  75. tests/regscale/integrations/public/fedramp/__init__.py +1 -0
  76. tests/regscale/integrations/public/fedramp/test_poam_export_v5.py +1293 -0
  77. tests/regscale/integrations/test_control_matcher.py +1314 -0
  78. tests/regscale/integrations/test_control_matching.py +155 -0
  79. tests/regscale/integrations/test_milestone_manager.py +408 -0
  80. tests/regscale/models/test_issue.py +378 -1
  81. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/LICENSE +0 -0
  82. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/WHEEL +0 -0
  83. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/entry_points.txt +0 -0
  84. {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/top_level.txt +0 -0
@@ -1,9 +1,204 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.09.11",
4
- "dateReleased": "2025-09-11T17:00:46.0046Z",
5
- "count": 1414,
3
+ "catalogVersion": "2025.10.02",
4
+ "dateReleased": "2025-10-02T14:59:13.7696Z",
5
+ "count": 1427,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2014-6278",
9
+ "vendorProject": "GNU",
10
+ "product": "GNU Bash",
11
+ "vulnerabilityName": "GNU Bash OS Command Injection Vulnerability",
12
+ "dateAdded": "2025-10-02",
13
+ "shortDescription": "GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. ",
15
+ "dueDate": "2025-10-23",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http:\/\/ftp.gnu.org\/gnu\/bash\/bash-4.3-patches\/bash43-027 ; https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/23467 ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20140926-bash ; https:\/\/www.ibm.com\/support\/pages\/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6278",
18
+ "cwes": [
19
+ "CWE-78"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2017-1000353",
24
+ "vendorProject": "Jenkins",
25
+ "product": "Jenkins",
26
+ "vulnerabilityName": "Jenkins Remote Code Execution Vulnerability",
27
+ "dateAdded": "2025-10-02",
28
+ "shortDescription": "Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-10-23",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/www.jenkins.io\/security\/advisory\/2017-04-26\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000353",
33
+ "cwes": []
34
+ },
35
+ {
36
+ "cveID": "CVE-2015-7755",
37
+ "vendorProject": "Juniper",
38
+ "product": "ScreenOS",
39
+ "vulnerabilityName": "Juniper ScreenOS Improper Authentication Vulnerability",
40
+ "dateAdded": "2025-10-02",
41
+ "shortDescription": "Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.",
42
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
43
+ "dueDate": "2025-10-23",
44
+ "knownRansomwareCampaignUse": "Unknown",
45
+ "notes": "https:\/\/supportportal.juniper.net\/s\/article\/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7755",
46
+ "cwes": [
47
+ "CWE-287"
48
+ ]
49
+ },
50
+ {
51
+ "cveID": "CVE-2025-21043",
52
+ "vendorProject": "Samsung",
53
+ "product": "Mobile Devices",
54
+ "vulnerabilityName": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability",
55
+ "dateAdded": "2025-10-02",
56
+ "shortDescription": "Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.",
57
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
58
+ "dueDate": "2025-10-23",
59
+ "knownRansomwareCampaignUse": "Unknown",
60
+ "notes": "https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&month=09 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21043",
61
+ "cwes": [
62
+ "CWE-787"
63
+ ]
64
+ },
65
+ {
66
+ "cveID": "CVE-2025-4008",
67
+ "vendorProject": "Smartbedded",
68
+ "product": "Meteobridge",
69
+ "vulnerabilityName": "Smartbedded Meteobridge Command Injection Vulnerability",
70
+ "dateAdded": "2025-10-02",
71
+ "shortDescription": "Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.",
72
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
73
+ "dueDate": "2025-10-23",
74
+ "knownRansomwareCampaignUse": "Unknown",
75
+ "notes": "https:\/\/forum.meteohub.de\/viewtopic.php?t=18687 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4008",
76
+ "cwes": [
77
+ "CWE-306",
78
+ "CWE-77"
79
+ ]
80
+ },
81
+ {
82
+ "cveID": "CVE-2025-32463",
83
+ "vendorProject": "Sudo",
84
+ "product": "Sudo",
85
+ "vulnerabilityName": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability",
86
+ "dateAdded": "2025-09-29",
87
+ "shortDescription": "Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo\u2019s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.",
88
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
89
+ "dueDate": "2025-10-20",
90
+ "knownRansomwareCampaignUse": "Unknown",
91
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/www.sudo.ws\/security\/advisories\/chroot_bug\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32463",
92
+ "cwes": [
93
+ "CWE-829"
94
+ ]
95
+ },
96
+ {
97
+ "cveID": "CVE-2025-59689",
98
+ "vendorProject": "Libraesva",
99
+ "product": "Email Security Gateway",
100
+ "vulnerabilityName": "Libraesva Email Security Gateway Command Injection Vulnerability",
101
+ "dateAdded": "2025-09-29",
102
+ "shortDescription": "Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.",
103
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
104
+ "dueDate": "2025-10-20",
105
+ "knownRansomwareCampaignUse": "Unknown",
106
+ "notes": "https:\/\/docs.libraesva.com\/knowledgebase\/security-advisory-command-injection-vulnerability-cve-2025-59689\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59689",
107
+ "cwes": [
108
+ "CWE-77"
109
+ ]
110
+ },
111
+ {
112
+ "cveID": "CVE-2025-10035",
113
+ "vendorProject": "Fortra",
114
+ "product": "GoAnywhere MFT",
115
+ "vulnerabilityName": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability",
116
+ "dateAdded": "2025-09-29",
117
+ "shortDescription": "Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.",
118
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
119
+ "dueDate": "2025-10-20",
120
+ "knownRansomwareCampaignUse": "Unknown",
121
+ "notes": "https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2025-012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035",
122
+ "cwes": [
123
+ "CWE-502",
124
+ "CWE-77"
125
+ ]
126
+ },
127
+ {
128
+ "cveID": "CVE-2025-20352",
129
+ "vendorProject": "Cisco",
130
+ "product": "IOS and IOS XE",
131
+ "vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
132
+ "dateAdded": "2025-09-29",
133
+ "shortDescription": "Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.",
134
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
135
+ "dueDate": "2025-10-20",
136
+ "knownRansomwareCampaignUse": "Unknown",
137
+ "notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-snmp-x4LPhte ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20352",
138
+ "cwes": [
139
+ "CWE-121"
140
+ ]
141
+ },
142
+ {
143
+ "cveID": "CVE-2021-21311",
144
+ "vendorProject": "Adminer",
145
+ "product": "Adminer",
146
+ "vulnerabilityName": "Adminer Server-Side Request Forgery Vulnerability",
147
+ "dateAdded": "2025-09-29",
148
+ "shortDescription": "Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.",
149
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
150
+ "dueDate": "2025-10-20",
151
+ "knownRansomwareCampaignUse": "Unknown",
152
+ "notes": "https:\/\/github.com\/vrana\/adminer\/security\/advisories\/GHSA-x5r2-hj5c-8jx6 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21311",
153
+ "cwes": [
154
+ "CWE-918"
155
+ ]
156
+ },
157
+ {
158
+ "cveID": "CVE-2025-20362",
159
+ "vendorProject": "Cisco",
160
+ "product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
161
+ "vulnerabilityName": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability",
162
+ "dateAdded": "2025-09-25",
163
+ "shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.",
164
+ "requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
165
+ "dueDate": "2025-09-26",
166
+ "knownRansomwareCampaignUse": "Unknown",
167
+ "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-YROOTUW ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20362",
168
+ "cwes": [
169
+ "CWE-862"
170
+ ]
171
+ },
172
+ {
173
+ "cveID": "CVE-2025-20333",
174
+ "vendorProject": "Cisco",
175
+ "product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
176
+ "vulnerabilityName": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability",
177
+ "dateAdded": "2025-09-25",
178
+ "shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.",
179
+ "requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
180
+ "dueDate": "2025-09-26",
181
+ "knownRansomwareCampaignUse": "Unknown",
182
+ "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-z5xP8EUB ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20333",
183
+ "cwes": [
184
+ "CWE-120"
185
+ ]
186
+ },
187
+ {
188
+ "cveID": "CVE-2025-10585",
189
+ "vendorProject": "Google",
190
+ "product": "Chromium V8",
191
+ "vulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
192
+ "dateAdded": "2025-09-23",
193
+ "shortDescription": "Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.",
194
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
195
+ "dueDate": "2025-10-14",
196
+ "knownRansomwareCampaignUse": "Unknown",
197
+ "notes": "https:\/\/chromereleases.googleblog.com\/2025\/09\/stable-channel-update-for-desktop_17.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10585",
198
+ "cwes": [
199
+ "CWE-843"
200
+ ]
201
+ },
7
202
  {
8
203
  "cveID": "CVE-2025-5086",
9
204
  "vendorProject": "Dassault Syst\u00e8mes",
@@ -2444,7 +2639,7 @@
2444
2639
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
2445
2640
  "dueDate": "2025-02-13",
2446
2641
  "knownRansomwareCampaignUse": "Unknown",
2447
- "notes": "https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
2642
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/jquery\/jquery\/security\/advisories\/GHSA-jpcq-cgw6-v4j6 ; https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
2448
2643
  "cwes": [
2449
2644
  "CWE-79"
2450
2645
  ]
@@ -25,11 +25,11 @@ CVE = "CVEs"
25
25
 
26
26
  class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
27
27
  """
28
- Nexpose Scan information
28
+ Nexpose Scan information with FedRAMP POAM export support
29
29
  """
30
30
 
31
31
  def __init__(self, **kwargs): # pylint: disable=R0902
32
- self.name = kwargs.get("name")
32
+ self.name: str = kwargs.get("name", "Nexpose")
33
33
  self.vuln_title = VULNERABILITY_TITLE
34
34
  self.vuln_id = VULNERABILITY_ID
35
35
  self.cvss3_score = CVSS3_SCORE
@@ -46,13 +46,18 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
46
46
  "Solution",
47
47
  "CVEs",
48
48
  ]
49
- self.mapping_file = kwargs.get("mappings_path")
50
- self.disable_mapping = kwargs.get("disable_mapping")
49
+ self.mapping_file: Optional[str] = kwargs.get("mappings_path")
50
+ self.disable_mapping: Optional[bool] = kwargs.get("disable_mapping")
51
+ file_path: Optional[str] = kwargs.get("file_path")
51
52
  self.validater = ImportValidater(
52
- self.required_headers, kwargs.get("file_path"), self.mapping_file, self.disable_mapping
53
+ self.required_headers, file_path or "", self.mapping_file or "", self.disable_mapping or False
53
54
  )
54
55
  self.headers = self.validater.parsed_headers
55
56
  self.mapping = self.validater.mapping
57
+
58
+ # Store file path for property generation
59
+ self.file_path = kwargs.get("file_path")
60
+
56
61
  logger = create_logger()
57
62
  super().__init__(
58
63
  logger=logger,
@@ -127,6 +132,8 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
127
132
  :return: IssueSeverity or None
128
133
  :rtype: Optional[IssueSeverity]
129
134
  """
135
+ if not text_severity:
136
+ return None
130
137
  if text_severity.lower() == "low":
131
138
  return IssueSeverity.Low
132
139
  if text_severity.lower() in ["medium", "moderate"]:
@@ -170,9 +177,30 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
170
177
 
171
178
  return severity
172
179
 
173
- def create_vuln(self, dat: Optional[dict] = None, **kwargs) -> Optional[IntegrationFinding]:
180
+ def get_source_file_path(self) -> Optional[str]:
174
181
  """
175
- Create an IntegrationFinding from a row in the Prisma/Nexpose csv file
182
+ Get source file path for POAM ID generation
183
+
184
+ Returns file_path if set, None otherwise.
185
+ This supports FedRAMP POAM export logic that generates POAM IDs
186
+ based on source file path properties (e.g., pdf, signatures, campaign, etc.)
187
+
188
+ Note: Properties must be created separately after Issue creation using
189
+ Property.create() or bulk operations, as IntegrationFinding doesn't
190
+ directly support properties.
191
+
192
+ :return: Source file path string or None
193
+ :rtype: Optional[str]
194
+ """
195
+ if not self.file_path:
196
+ return None
197
+ return str(self.file_path)
198
+
199
+ def create_vuln(
200
+ self, dat: Optional[dict] = None, **kwargs
201
+ ) -> Optional[IntegrationFinding]: # pylint: disable=unused-argument
202
+ """
203
+ Create an IntegrationFinding from a row in the Nexpose csv file
176
204
 
177
205
  :param Optional[dict] dat: Data row from CSV file, defaults to None
178
206
  :param kwargs: Additional keyword arguments
@@ -189,8 +217,6 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
189
217
  # Determine severity using priority logic
190
218
  severity = self._determine_severity(dat)
191
219
 
192
- # Find matching asset
193
-
194
220
  # Extract date information
195
221
  first_seen = (
196
222
  self.mapping.get_value(dat, self.first_seen)
@@ -216,7 +242,7 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
216
242
  cvss_score=cvss_score or 0.0,
217
243
  cvss_v3_score=cvss3_score or 0.0,
218
244
  cvss_v2_score=cvss_score or 0.0,
219
- plugin_text=description[:255],
245
+ plugin_text=description[:255] if description else "",
220
246
  remediation=self.mapping.get_value(dat, "Solution"),
221
247
  category="Hardware",
222
248
  status=IssueStatus.Open,