regscale-cli 6.25.1.0__py3-none-any.whl → 6.27.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

Files changed (146) hide show
  1. regscale/_version.py +1 -1
  2. regscale/airflow/hierarchy.py +2 -2
  3. regscale/core/app/application.py +19 -4
  4. regscale/core/app/internal/evidence.py +419 -2
  5. regscale/core/app/internal/login.py +0 -1
  6. regscale/core/app/utils/catalog_utils/common.py +1 -1
  7. regscale/dev/code_gen.py +24 -20
  8. regscale/integrations/commercial/jira.py +367 -126
  9. regscale/integrations/commercial/qualys/__init__.py +7 -8
  10. regscale/integrations/commercial/qualys/scanner.py +8 -3
  11. regscale/integrations/commercial/sicura/api.py +14 -13
  12. regscale/integrations/commercial/sicura/commands.py +8 -2
  13. regscale/integrations/commercial/sicura/scanner.py +49 -39
  14. regscale/integrations/commercial/stigv2/ckl_parser.py +5 -5
  15. regscale/integrations/commercial/synqly/assets.py +17 -0
  16. regscale/integrations/commercial/synqly/vulnerabilities.py +45 -28
  17. regscale/integrations/commercial/tenablev2/cis_parsers.py +453 -0
  18. regscale/integrations/commercial/tenablev2/cis_scanner.py +447 -0
  19. regscale/integrations/commercial/tenablev2/commands.py +142 -1
  20. regscale/integrations/commercial/tenablev2/scanner.py +0 -1
  21. regscale/integrations/commercial/tenablev2/stig_parsers.py +113 -57
  22. regscale/integrations/commercial/wizv2/WizDataMixin.py +1 -1
  23. regscale/integrations/commercial/wizv2/click.py +64 -79
  24. regscale/integrations/commercial/wizv2/compliance/__init__.py +15 -0
  25. regscale/integrations/commercial/wizv2/{policy_compliance_helpers.py → compliance/helpers.py} +78 -60
  26. regscale/integrations/commercial/wizv2/compliance_report.py +161 -165
  27. regscale/integrations/commercial/wizv2/core/__init__.py +133 -0
  28. regscale/integrations/commercial/wizv2/{async_client.py → core/client.py} +3 -3
  29. regscale/integrations/commercial/wizv2/{constants.py → core/constants.py} +1 -17
  30. regscale/integrations/commercial/wizv2/core/file_operations.py +237 -0
  31. regscale/integrations/commercial/wizv2/fetchers/__init__.py +11 -0
  32. regscale/integrations/commercial/wizv2/{data_fetcher.py → fetchers/policy_assessment.py} +5 -9
  33. regscale/integrations/commercial/wizv2/issue.py +1 -1
  34. regscale/integrations/commercial/wizv2/models/__init__.py +0 -0
  35. regscale/integrations/commercial/wizv2/parsers/__init__.py +34 -0
  36. regscale/integrations/commercial/wizv2/{parsers.py → parsers/main.py} +1 -1
  37. regscale/integrations/commercial/wizv2/processors/__init__.py +11 -0
  38. regscale/integrations/commercial/wizv2/{finding_processor.py → processors/finding.py} +1 -1
  39. regscale/integrations/commercial/wizv2/reports.py +1 -1
  40. regscale/integrations/commercial/wizv2/sbom.py +1 -1
  41. regscale/integrations/commercial/wizv2/scanner.py +39 -99
  42. regscale/integrations/commercial/wizv2/utils/__init__.py +48 -0
  43. regscale/integrations/commercial/wizv2/{utils.py → utils/main.py} +116 -61
  44. regscale/integrations/commercial/wizv2/variables.py +89 -3
  45. regscale/integrations/compliance_integration.py +60 -41
  46. regscale/integrations/control_matcher.py +377 -0
  47. regscale/integrations/due_date_handler.py +14 -8
  48. regscale/integrations/milestone_manager.py +291 -0
  49. regscale/integrations/public/__init__.py +1 -0
  50. regscale/integrations/public/cci_importer.py +37 -38
  51. regscale/integrations/public/fedramp/click.py +60 -2
  52. regscale/integrations/public/fedramp/docx_parser.py +10 -1
  53. regscale/integrations/public/fedramp/fedramp_cis_crm.py +393 -340
  54. regscale/integrations/public/fedramp/fedramp_five.py +1 -1
  55. regscale/integrations/public/fedramp/poam_export_v5.py +888 -0
  56. regscale/integrations/scanner_integration.py +277 -153
  57. regscale/models/integration_models/cisa_kev_data.json +282 -9
  58. regscale/models/integration_models/nexpose.py +36 -10
  59. regscale/models/integration_models/qualys.py +3 -4
  60. regscale/models/integration_models/synqly_models/capabilities.json +1 -1
  61. regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +24 -7
  62. regscale/models/integration_models/synqly_models/synqly_model.py +8 -1
  63. regscale/models/locking.py +12 -8
  64. regscale/models/platform.py +1 -2
  65. regscale/models/regscale_models/control_implementation.py +47 -22
  66. regscale/models/regscale_models/issue.py +256 -95
  67. regscale/models/regscale_models/milestone.py +1 -1
  68. regscale/models/regscale_models/regscale_model.py +6 -1
  69. regscale/templates/__init__.py +0 -0
  70. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/METADATA +1 -17
  71. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/RECORD +145 -65
  72. tests/regscale/integrations/commercial/__init__.py +0 -0
  73. tests/regscale/integrations/commercial/conftest.py +28 -0
  74. tests/regscale/integrations/commercial/microsoft_defender/__init__.py +1 -0
  75. tests/regscale/integrations/commercial/microsoft_defender/test_defender.py +1517 -0
  76. tests/regscale/integrations/commercial/microsoft_defender/test_defender_api.py +1748 -0
  77. tests/regscale/integrations/commercial/microsoft_defender/test_defender_constants.py +327 -0
  78. tests/regscale/integrations/commercial/microsoft_defender/test_defender_scanner.py +487 -0
  79. tests/regscale/integrations/commercial/test_aws.py +3731 -0
  80. tests/regscale/integrations/commercial/test_burp.py +48 -0
  81. tests/regscale/integrations/commercial/test_crowdstrike.py +49 -0
  82. tests/regscale/integrations/commercial/test_dependabot.py +341 -0
  83. tests/regscale/integrations/commercial/test_gcp.py +1543 -0
  84. tests/regscale/integrations/commercial/test_gitlab.py +549 -0
  85. tests/regscale/integrations/commercial/test_ip_mac_address_length.py +84 -0
  86. tests/regscale/integrations/commercial/test_jira.py +2204 -0
  87. tests/regscale/integrations/commercial/test_npm_audit.py +42 -0
  88. tests/regscale/integrations/commercial/test_okta.py +1228 -0
  89. tests/regscale/integrations/commercial/test_sarif_converter.py +251 -0
  90. tests/regscale/integrations/commercial/test_sicura.py +350 -0
  91. tests/regscale/integrations/commercial/test_snow.py +423 -0
  92. tests/regscale/integrations/commercial/test_sonarcloud.py +394 -0
  93. tests/regscale/integrations/commercial/test_sqlserver.py +186 -0
  94. tests/regscale/integrations/commercial/test_stig.py +33 -0
  95. tests/regscale/integrations/commercial/test_stig_mapper.py +153 -0
  96. tests/regscale/integrations/commercial/test_stigv2.py +406 -0
  97. tests/regscale/integrations/commercial/test_wiz.py +1365 -0
  98. tests/regscale/integrations/commercial/test_wiz_inventory.py +256 -0
  99. tests/regscale/integrations/commercial/wizv2/__init__.py +339 -0
  100. tests/regscale/integrations/commercial/wizv2/compliance/__init__.py +1 -0
  101. tests/regscale/integrations/commercial/wizv2/compliance/test_helpers.py +903 -0
  102. tests/regscale/integrations/commercial/wizv2/core/__init__.py +1 -0
  103. tests/regscale/integrations/commercial/wizv2/core/test_auth.py +701 -0
  104. tests/regscale/integrations/commercial/wizv2/core/test_client.py +1037 -0
  105. tests/regscale/integrations/commercial/wizv2/core/test_file_operations.py +989 -0
  106. tests/regscale/integrations/commercial/wizv2/fetchers/__init__.py +1 -0
  107. tests/regscale/integrations/commercial/wizv2/fetchers/test_policy_assessment.py +805 -0
  108. tests/regscale/integrations/commercial/wizv2/parsers/__init__.py +1 -0
  109. tests/regscale/integrations/commercial/wizv2/parsers/test_main.py +1153 -0
  110. tests/regscale/integrations/commercial/wizv2/processors/__init__.py +1 -0
  111. tests/regscale/integrations/commercial/wizv2/processors/test_finding.py +671 -0
  112. tests/regscale/integrations/commercial/wizv2/test_WizDataMixin.py +537 -0
  113. tests/regscale/integrations/commercial/wizv2/test_click_comprehensive.py +851 -0
  114. tests/regscale/integrations/commercial/wizv2/test_compliance_report_comprehensive.py +910 -0
  115. tests/regscale/integrations/commercial/wizv2/test_compliance_report_normalization.py +138 -0
  116. tests/regscale/integrations/commercial/wizv2/test_file_cleanup.py +283 -0
  117. tests/regscale/integrations/commercial/wizv2/test_file_operations.py +260 -0
  118. tests/regscale/integrations/commercial/wizv2/test_issue.py +343 -0
  119. tests/regscale/integrations/commercial/wizv2/test_issue_comprehensive.py +1203 -0
  120. tests/regscale/integrations/commercial/wizv2/test_reports.py +497 -0
  121. tests/regscale/integrations/commercial/wizv2/test_sbom.py +643 -0
  122. tests/regscale/integrations/commercial/wizv2/test_scanner_comprehensive.py +805 -0
  123. tests/regscale/integrations/commercial/wizv2/test_wiz_click_client_id.py +165 -0
  124. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_report.py +1394 -0
  125. tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_unit.py +341 -0
  126. tests/regscale/integrations/commercial/wizv2/test_wiz_control_normalization.py +138 -0
  127. tests/regscale/integrations/commercial/wizv2/test_wiz_findings_comprehensive.py +364 -0
  128. tests/regscale/integrations/commercial/wizv2/test_wiz_inventory_comprehensive.py +644 -0
  129. tests/regscale/integrations/commercial/wizv2/test_wiz_status_mapping.py +149 -0
  130. tests/regscale/integrations/commercial/wizv2/test_wizv2.py +1132 -0
  131. tests/regscale/integrations/commercial/wizv2/test_wizv2_utils.py +519 -0
  132. tests/regscale/integrations/commercial/wizv2/utils/__init__.py +1 -0
  133. tests/regscale/integrations/commercial/wizv2/utils/test_main.py +1523 -0
  134. tests/regscale/integrations/public/fedramp/__init__.py +1 -0
  135. tests/regscale/integrations/public/fedramp/test_poam_export_v5.py +1293 -0
  136. tests/regscale/integrations/public/test_fedramp.py +301 -0
  137. tests/regscale/integrations/test_control_matcher.py +1397 -0
  138. tests/regscale/integrations/test_control_matching.py +155 -0
  139. tests/regscale/integrations/test_milestone_manager.py +408 -0
  140. tests/regscale/models/test_issue.py +378 -1
  141. regscale/integrations/commercial/wizv2/policy_compliance.py +0 -3543
  142. /regscale/integrations/commercial/wizv2/{wiz_auth.py → core/auth.py} +0 -0
  143. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/LICENSE +0 -0
  144. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/WHEEL +0 -0
  145. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/entry_points.txt +0 -0
  146. {regscale_cli-6.25.1.0.dist-info → regscale_cli-6.27.0.0.dist-info}/top_level.txt +0 -0
@@ -1,9 +1,282 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.09.25",
4
- "dateReleased": "2025-09-25T16:17:38.0447Z",
5
- "count": 1417,
3
+ "catalogVersion": "2025.10.09",
4
+ "dateReleased": "2025-10-09T16:52:28.6547Z",
5
+ "count": 1436,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2021-43798",
9
+ "vendorProject": "Grafana Labs",
10
+ "product": "Grafana",
11
+ "vulnerabilityName": "Grafana Path Traversal Vulnerability",
12
+ "dateAdded": "2025-10-09",
13
+ "shortDescription": "Grafana contains a path traversal vulnerability that could allow access to local files.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-10-30",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "https:\/\/grafana.com\/blog\/2021\/12\/07\/grafana-8.3.1-8.2.7-8.1.8-and-8.0.7-released-with-high-severity-security-fix\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43798",
18
+ "cwes": [
19
+ "CWE-22"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2025-27915",
24
+ "vendorProject": "Synacor",
25
+ "product": "Zimbra Collaboration Suite (ZCS)",
26
+ "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability",
27
+ "dateAdded": "2025-10-07",
28
+ "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-10-28",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/wiki.zimbra.com\/wiki\/Security_Center ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27915",
33
+ "cwes": [
34
+ "CWE-79"
35
+ ]
36
+ },
37
+ {
38
+ "cveID": "CVE-2021-22555",
39
+ "vendorProject": "Linux",
40
+ "product": "Kernel",
41
+ "vulnerabilityName": "Linux Kernel Heap Out-of-Bounds Write Vulnerability",
42
+ "dateAdded": "2025-10-06",
43
+ "shortDescription": "Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.",
44
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45
+ "dueDate": "2025-10-27",
46
+ "knownRansomwareCampaignUse": "Unknown",
47
+ "notes": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/net\/netfilter\/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/net\/netfilter\/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https:\/\/security.netapp.com\/advisory\/ntap-20210805-0010\/ ; https:\/\/github.com\/google\/security-research\/security\/advisories\/GHSA-xxx5-8mvq-3528 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22555",
48
+ "cwes": [
49
+ "CWE-787"
50
+ ]
51
+ },
52
+ {
53
+ "cveID": "CVE-2010-3962",
54
+ "vendorProject": "Microsoft",
55
+ "product": "Internet Explorer",
56
+ "vulnerabilityName": "Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability",
57
+ "dateAdded": "2025-10-06",
58
+ "shortDescription": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
59
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
60
+ "dueDate": "2025-10-27",
61
+ "knownRansomwareCampaignUse": "Unknown",
62
+ "notes": "https:\/\/learn.microsoft.com\/en-us\/security-updates\/SecurityAdvisories\/2010\/2458511?redirectedfrom=MSDN ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-3962",
63
+ "cwes": []
64
+ },
65
+ {
66
+ "cveID": "CVE-2021-43226",
67
+ "vendorProject": "Microsoft",
68
+ "product": "Windows",
69
+ "vulnerabilityName": "Microsoft Windows Privilege Escalation Vulnerability",
70
+ "dateAdded": "2025-10-06",
71
+ "shortDescription": "Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.",
72
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
73
+ "dueDate": "2025-10-27",
74
+ "knownRansomwareCampaignUse": "Unknown",
75
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43226 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43226",
76
+ "cwes": []
77
+ },
78
+ {
79
+ "cveID": "CVE-2013-3918",
80
+ "vendorProject": "Microsoft",
81
+ "product": "Windows",
82
+ "vulnerabilityName": "Microsoft Windows Out-of-Bounds Write Vulnerability",
83
+ "dateAdded": "2025-10-06",
84
+ "shortDescription": "Microsoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
85
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
86
+ "dueDate": "2025-10-27",
87
+ "knownRansomwareCampaignUse": "Unknown",
88
+ "notes": "https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2013\/ms13-090 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-3918",
89
+ "cwes": []
90
+ },
91
+ {
92
+ "cveID": "CVE-2011-3402",
93
+ "vendorProject": "Microsoft",
94
+ "product": "Windows",
95
+ "vulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability",
96
+ "dateAdded": "2025-10-06",
97
+ "shortDescription": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.",
98
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
99
+ "dueDate": "2025-10-27",
100
+ "knownRansomwareCampaignUse": "Unknown",
101
+ "notes": "https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2011\/ms11-087 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2011-3402",
102
+ "cwes": []
103
+ },
104
+ {
105
+ "cveID": "CVE-2010-3765",
106
+ "vendorProject": "Mozilla",
107
+ "product": "Multiple Products",
108
+ "vulnerabilityName": "Mozilla Multiple Products Remote Code Execution Vulnerability",
109
+ "dateAdded": "2025-10-06",
110
+ "shortDescription": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.",
111
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
112
+ "dueDate": "2025-10-27",
113
+ "knownRansomwareCampaignUse": "Unknown",
114
+ "notes": "https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2010-73 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-3765",
115
+ "cwes": []
116
+ },
117
+ {
118
+ "cveID": "CVE-2025-61882",
119
+ "vendorProject": "Oracle",
120
+ "product": "E-Business Suite",
121
+ "vulnerabilityName": "Oracle E-Business Suite Unspecified Vulnerability",
122
+ "dateAdded": "2025-10-06",
123
+ "shortDescription": "Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.",
124
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
125
+ "dueDate": "2025-10-27",
126
+ "knownRansomwareCampaignUse": "Known",
127
+ "notes": "https:\/\/www.oracle.com\/security-alerts\/alert-cve-2025-61882.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61882",
128
+ "cwes": []
129
+ },
130
+ {
131
+ "cveID": "CVE-2014-6278",
132
+ "vendorProject": "GNU",
133
+ "product": "GNU Bash",
134
+ "vulnerabilityName": "GNU Bash OS Command Injection Vulnerability",
135
+ "dateAdded": "2025-10-02",
136
+ "shortDescription": "GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.",
137
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. ",
138
+ "dueDate": "2025-10-23",
139
+ "knownRansomwareCampaignUse": "Unknown",
140
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http:\/\/ftp.gnu.org\/gnu\/bash\/bash-4.3-patches\/bash43-027 ; https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/23467 ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20140926-bash ; https:\/\/www.ibm.com\/support\/pages\/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6278",
141
+ "cwes": [
142
+ "CWE-78"
143
+ ]
144
+ },
145
+ {
146
+ "cveID": "CVE-2017-1000353",
147
+ "vendorProject": "Jenkins",
148
+ "product": "Jenkins",
149
+ "vulnerabilityName": "Jenkins Remote Code Execution Vulnerability",
150
+ "dateAdded": "2025-10-02",
151
+ "shortDescription": "Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.",
152
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
153
+ "dueDate": "2025-10-23",
154
+ "knownRansomwareCampaignUse": "Unknown",
155
+ "notes": "https:\/\/www.jenkins.io\/security\/advisory\/2017-04-26\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000353",
156
+ "cwes": []
157
+ },
158
+ {
159
+ "cveID": "CVE-2015-7755",
160
+ "vendorProject": "Juniper",
161
+ "product": "ScreenOS",
162
+ "vulnerabilityName": "Juniper ScreenOS Improper Authentication Vulnerability",
163
+ "dateAdded": "2025-10-02",
164
+ "shortDescription": "Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.",
165
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
166
+ "dueDate": "2025-10-23",
167
+ "knownRansomwareCampaignUse": "Unknown",
168
+ "notes": "https:\/\/supportportal.juniper.net\/s\/article\/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7755",
169
+ "cwes": [
170
+ "CWE-287"
171
+ ]
172
+ },
173
+ {
174
+ "cveID": "CVE-2025-21043",
175
+ "vendorProject": "Samsung",
176
+ "product": "Mobile Devices",
177
+ "vulnerabilityName": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability",
178
+ "dateAdded": "2025-10-02",
179
+ "shortDescription": "Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.",
180
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
181
+ "dueDate": "2025-10-23",
182
+ "knownRansomwareCampaignUse": "Unknown",
183
+ "notes": "https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&month=09 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21043",
184
+ "cwes": [
185
+ "CWE-787"
186
+ ]
187
+ },
188
+ {
189
+ "cveID": "CVE-2025-4008",
190
+ "vendorProject": "Smartbedded",
191
+ "product": "Meteobridge",
192
+ "vulnerabilityName": "Smartbedded Meteobridge Command Injection Vulnerability",
193
+ "dateAdded": "2025-10-02",
194
+ "shortDescription": "Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.",
195
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
196
+ "dueDate": "2025-10-23",
197
+ "knownRansomwareCampaignUse": "Unknown",
198
+ "notes": "https:\/\/forum.meteohub.de\/viewtopic.php?t=18687 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4008",
199
+ "cwes": [
200
+ "CWE-306",
201
+ "CWE-77"
202
+ ]
203
+ },
204
+ {
205
+ "cveID": "CVE-2025-32463",
206
+ "vendorProject": "Sudo",
207
+ "product": "Sudo",
208
+ "vulnerabilityName": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability",
209
+ "dateAdded": "2025-09-29",
210
+ "shortDescription": "Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo\u2019s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.",
211
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
212
+ "dueDate": "2025-10-20",
213
+ "knownRansomwareCampaignUse": "Unknown",
214
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/www.sudo.ws\/security\/advisories\/chroot_bug\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32463",
215
+ "cwes": [
216
+ "CWE-829"
217
+ ]
218
+ },
219
+ {
220
+ "cveID": "CVE-2025-59689",
221
+ "vendorProject": "Libraesva",
222
+ "product": "Email Security Gateway",
223
+ "vulnerabilityName": "Libraesva Email Security Gateway Command Injection Vulnerability",
224
+ "dateAdded": "2025-09-29",
225
+ "shortDescription": "Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.",
226
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
227
+ "dueDate": "2025-10-20",
228
+ "knownRansomwareCampaignUse": "Unknown",
229
+ "notes": "https:\/\/docs.libraesva.com\/knowledgebase\/security-advisory-command-injection-vulnerability-cve-2025-59689\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59689",
230
+ "cwes": [
231
+ "CWE-77"
232
+ ]
233
+ },
234
+ {
235
+ "cveID": "CVE-2025-10035",
236
+ "vendorProject": "Fortra",
237
+ "product": "GoAnywhere MFT",
238
+ "vulnerabilityName": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability",
239
+ "dateAdded": "2025-09-29",
240
+ "shortDescription": "Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.",
241
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
242
+ "dueDate": "2025-10-20",
243
+ "knownRansomwareCampaignUse": "Known",
244
+ "notes": "https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2025-012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035",
245
+ "cwes": [
246
+ "CWE-502",
247
+ "CWE-77"
248
+ ]
249
+ },
250
+ {
251
+ "cveID": "CVE-2025-20352",
252
+ "vendorProject": "Cisco",
253
+ "product": "IOS and IOS XE",
254
+ "vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
255
+ "dateAdded": "2025-09-29",
256
+ "shortDescription": "Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.",
257
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
258
+ "dueDate": "2025-10-20",
259
+ "knownRansomwareCampaignUse": "Unknown",
260
+ "notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-snmp-x4LPhte ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20352",
261
+ "cwes": [
262
+ "CWE-121"
263
+ ]
264
+ },
265
+ {
266
+ "cveID": "CVE-2021-21311",
267
+ "vendorProject": "Adminer",
268
+ "product": "Adminer",
269
+ "vulnerabilityName": "Adminer Server-Side Request Forgery Vulnerability",
270
+ "dateAdded": "2025-09-29",
271
+ "shortDescription": "Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.",
272
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
273
+ "dueDate": "2025-10-20",
274
+ "knownRansomwareCampaignUse": "Unknown",
275
+ "notes": "https:\/\/github.com\/vrana\/adminer\/security\/advisories\/GHSA-x5r2-hj5c-8jx6 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21311",
276
+ "cwes": [
277
+ "CWE-918"
278
+ ]
279
+ },
7
280
  {
8
281
  "cveID": "CVE-2025-20362",
9
282
  "vendorProject": "Cisco",
@@ -2489,7 +2762,7 @@
2489
2762
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
2490
2763
  "dueDate": "2025-02-13",
2491
2764
  "knownRansomwareCampaignUse": "Unknown",
2492
- "notes": "https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
2765
+ "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/jquery\/jquery\/security\/advisories\/GHSA-jpcq-cgw6-v4j6 ; https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
2493
2766
  "cwes": [
2494
2767
  "CWE-79"
2495
2768
  ]
@@ -5055,7 +5328,7 @@
5055
5328
  "shortDescription": "Microsoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass.",
5056
5329
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5057
5330
  "dueDate": "2024-03-05",
5058
- "knownRansomwareCampaignUse": "Unknown",
5331
+ "knownRansomwareCampaignUse": "Known",
5059
5332
  "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21412; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21412",
5060
5333
  "cwes": [
5061
5334
  "CWE-693"
@@ -5145,8 +5418,8 @@
5145
5418
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.",
5146
5419
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5147
5420
  "dueDate": "2024-02-02",
5148
- "knownRansomwareCampaignUse": "Unknown",
5149
- "notes": "https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21893",
5421
+ "knownRansomwareCampaignUse": "Known",
5422
+ "notes": "https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21893",
5150
5423
  "cwes": [
5151
5424
  "CWE-918"
5152
5425
  ]
@@ -5295,7 +5568,7 @@
5295
5568
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.",
5296
5569
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5297
5570
  "dueDate": "2024-01-22",
5298
- "knownRansomwareCampaignUse": "Unknown",
5571
+ "knownRansomwareCampaignUse": "Known",
5299
5572
  "notes": "Please apply mitigations per vendor instructions. For more information, please see: https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-46805",
5300
5573
  "cwes": [
5301
5574
  "CWE-287"
@@ -5310,7 +5583,7 @@
5310
5583
  "shortDescription": "Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue.",
5311
5584
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5312
5585
  "dueDate": "2024-01-22",
5313
- "knownRansomwareCampaignUse": "Unknown",
5586
+ "knownRansomwareCampaignUse": "Known",
5314
5587
  "notes": "Please apply mitigations per vendor instructions. For more information, please see: https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21887",
5315
5588
  "cwes": [
5316
5589
  "CWE-77"
@@ -25,11 +25,11 @@ CVE = "CVEs"
25
25
 
26
26
  class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
27
27
  """
28
- Nexpose Scan information
28
+ Nexpose Scan information with FedRAMP POAM export support
29
29
  """
30
30
 
31
31
  def __init__(self, **kwargs): # pylint: disable=R0902
32
- self.name = kwargs.get("name")
32
+ self.name: str = kwargs.get("name", "Nexpose")
33
33
  self.vuln_title = VULNERABILITY_TITLE
34
34
  self.vuln_id = VULNERABILITY_ID
35
35
  self.cvss3_score = CVSS3_SCORE
@@ -46,13 +46,18 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
46
46
  "Solution",
47
47
  "CVEs",
48
48
  ]
49
- self.mapping_file = kwargs.get("mappings_path")
50
- self.disable_mapping = kwargs.get("disable_mapping")
49
+ self.mapping_file: Optional[str] = kwargs.get("mappings_path")
50
+ self.disable_mapping: Optional[bool] = kwargs.get("disable_mapping")
51
+ file_path: Optional[str] = kwargs.get("file_path")
51
52
  self.validater = ImportValidater(
52
- self.required_headers, kwargs.get("file_path"), self.mapping_file, self.disable_mapping
53
+ self.required_headers, file_path or "", self.mapping_file or "", self.disable_mapping or False
53
54
  )
54
55
  self.headers = self.validater.parsed_headers
55
56
  self.mapping = self.validater.mapping
57
+
58
+ # Store file path for property generation
59
+ self.file_path = kwargs.get("file_path")
60
+
56
61
  logger = create_logger()
57
62
  super().__init__(
58
63
  logger=logger,
@@ -127,6 +132,8 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
127
132
  :return: IssueSeverity or None
128
133
  :rtype: Optional[IssueSeverity]
129
134
  """
135
+ if not text_severity:
136
+ return None
130
137
  if text_severity.lower() == "low":
131
138
  return IssueSeverity.Low
132
139
  if text_severity.lower() in ["medium", "moderate"]:
@@ -170,9 +177,30 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
170
177
 
171
178
  return severity
172
179
 
173
- def create_vuln(self, dat: Optional[dict] = None, **kwargs) -> Optional[IntegrationFinding]:
180
+ def get_source_file_path(self) -> Optional[str]:
174
181
  """
175
- Create an IntegrationFinding from a row in the Prisma/Nexpose csv file
182
+ Get source file path for POAM ID generation
183
+
184
+ Returns file_path if set, None otherwise.
185
+ This supports FedRAMP POAM export logic that generates POAM IDs
186
+ based on source file path properties (e.g., pdf, signatures, campaign, etc.)
187
+
188
+ Note: Properties must be created separately after Issue creation using
189
+ Property.create() or bulk operations, as IntegrationFinding doesn't
190
+ directly support properties.
191
+
192
+ :return: Source file path string or None
193
+ :rtype: Optional[str]
194
+ """
195
+ if not self.file_path:
196
+ return None
197
+ return str(self.file_path)
198
+
199
+ def create_vuln(
200
+ self, dat: Optional[dict] = None, **kwargs
201
+ ) -> Optional[IntegrationFinding]: # pylint: disable=unused-argument
202
+ """
203
+ Create an IntegrationFinding from a row in the Nexpose csv file
176
204
 
177
205
  :param Optional[dict] dat: Data row from CSV file, defaults to None
178
206
  :param kwargs: Additional keyword arguments
@@ -189,8 +217,6 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
189
217
  # Determine severity using priority logic
190
218
  severity = self._determine_severity(dat)
191
219
 
192
- # Find matching asset
193
-
194
220
  # Extract date information
195
221
  first_seen = (
196
222
  self.mapping.get_value(dat, self.first_seen)
@@ -216,7 +242,7 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
216
242
  cvss_score=cvss_score or 0.0,
217
243
  cvss_v3_score=cvss3_score or 0.0,
218
244
  cvss_v2_score=cvss_score or 0.0,
219
- plugin_text=description[:255],
245
+ plugin_text=description[:255] if description else "",
220
246
  remediation=self.mapping.get_value(dat, "Solution"),
221
247
  category="Hardware",
222
248
  status=IssueStatus.Open,
@@ -7,9 +7,8 @@ import logging
7
7
 
8
8
  # pylint: disable=C0415
9
9
  import re
10
- from calendar import firstweekday
11
10
  from datetime import datetime
12
- from typing import Any, Iterator, List, Optional, TextIO, TypeVar, Union
11
+ from typing import Iterator, List, Optional, TextIO, TypeVar, Union
13
12
 
14
13
  from openpyxl.reader.excel import load_workbook
15
14
  from pandas import Timestamp
@@ -119,7 +118,7 @@ class Qualys(FlatFileImporter):
119
118
  return IntegrationAsset(
120
119
  name=self.mapping.get_value(dat, DNS),
121
120
  ip_address=self.mapping.get_value(dat, IP),
122
- status=AssetStatus.Active.value,
121
+ status=AssetStatus.Active,
123
122
  cpu=0,
124
123
  ram=0,
125
124
  asset_category="Hardware",
@@ -162,7 +161,7 @@ class Qualys(FlatFileImporter):
162
161
  description: str = self.mapping.get_value(dat, "Threat")
163
162
  title = self.mapping.get_value(dat, self.vuln_title)
164
163
  severity = self.mapping.get_value(dat, SEVERITY)
165
- regscale_severity = map_qualys_severity_to_regscale(int(severity))[1]
164
+ regscale_severity, _ = map_qualys_severity_to_regscale(int(severity))
166
165
  if dat:
167
166
  finding = IntegrationFinding(
168
167
  control_labels=[], # Add an empty list for control_labels