regscale-cli 6.27.0.0__py3-none-any.whl → 6.27.1.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/integrations/commercial/__init__.py +0 -1
- regscale/models/integration_models/cisa_kev_data.json +91 -3
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +11 -10
- regscale/models/integration_models/synqly_models/ocsf_mapper.py +48 -8
- regscale/models/integration_models/synqly_models/synqly_model.py +34 -12
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/METADATA +1 -1
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/RECORD +12 -12
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/LICENSE +0 -0
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/WHEEL +0 -0
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.27.0.0.dist-info → regscale_cli-6.27.1.0.dist-info}/top_level.txt +0 -0
regscale/_version.py
CHANGED
|
@@ -489,7 +489,6 @@ show_mapping(veracode, "veracode")
|
|
|
489
489
|
"inventory": "regscale.integrations.commercial.wizv2.click.inventory",
|
|
490
490
|
"issues": "regscale.integrations.commercial.wizv2.click.issues",
|
|
491
491
|
"attach_sbom": "regscale.integrations.commercial.wizv2.click.attach_sbom",
|
|
492
|
-
"threats": "regscale.integrations.commercial.wizv2.click.threats",
|
|
493
492
|
"vulnerabilities": "regscale.integrations.commercial.wizv2.click.vulnerabilities",
|
|
494
493
|
"add_report_evidence": "regscale.integrations.commercial.wizv2.click.add_report_evidence",
|
|
495
494
|
"sync_compliance": "regscale.integrations.commercial.wizv2.click.sync_compliance",
|
|
@@ -1,9 +1,97 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.10.
|
|
4
|
-
"dateReleased": "2025-10-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.10.15",
|
|
4
|
+
"dateReleased": "2025-10-15T18:34:38.9479Z",
|
|
5
|
+
"count": 1442,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-54253",
|
|
9
|
+
"vendorProject": "Adobe",
|
|
10
|
+
"product": "Experience Manager (AEM) Forms",
|
|
11
|
+
"vulnerabilityName": "Adobe Experience Manager Forms Code Execution Vulnerability",
|
|
12
|
+
"dateAdded": "2025-10-15",
|
|
13
|
+
"shortDescription": "Adobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-11-05",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "https:\/\/helpx.adobe.com\/security\/products\/aem-forms\/apsb25-82.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54253",
|
|
18
|
+
"cwes": []
|
|
19
|
+
},
|
|
20
|
+
{
|
|
21
|
+
"cveID": "CVE-2025-47827",
|
|
22
|
+
"vendorProject": "IGEL",
|
|
23
|
+
"product": "IGEL OS",
|
|
24
|
+
"vulnerabilityName": "IGEL OS Use of a Key Past its Expiration Date Vulnerability",
|
|
25
|
+
"dateAdded": "2025-10-14",
|
|
26
|
+
"shortDescription": "IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.",
|
|
27
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
28
|
+
"dueDate": "2025-11-04",
|
|
29
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
30
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-47827 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-47827",
|
|
31
|
+
"cwes": [
|
|
32
|
+
"CWE-324"
|
|
33
|
+
]
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"cveID": "CVE-2025-24990",
|
|
37
|
+
"vendorProject": "Microsoft",
|
|
38
|
+
"product": "Windows",
|
|
39
|
+
"vulnerabilityName": "Microsoft Windows Untrusted Pointer Dereference Vulnerability",
|
|
40
|
+
"dateAdded": "2025-10-14",
|
|
41
|
+
"shortDescription": "Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.",
|
|
42
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
43
|
+
"dueDate": "2025-11-04",
|
|
44
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
45
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24990 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24990",
|
|
46
|
+
"cwes": [
|
|
47
|
+
"CWE-822"
|
|
48
|
+
]
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"cveID": "CVE-2025-59230",
|
|
52
|
+
"vendorProject": "Microsoft",
|
|
53
|
+
"product": "Windows",
|
|
54
|
+
"vulnerabilityName": "Microsoft Windows Improper Access Control Vulnerability",
|
|
55
|
+
"dateAdded": "2025-10-14",
|
|
56
|
+
"shortDescription": "Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.",
|
|
57
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
58
|
+
"dueDate": "2025-11-04",
|
|
59
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
60
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59230 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59230",
|
|
61
|
+
"cwes": [
|
|
62
|
+
"CWE-284"
|
|
63
|
+
]
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"cveID": "CVE-2025-6264",
|
|
67
|
+
"vendorProject": "Rapid7",
|
|
68
|
+
"product": "Velociraptor",
|
|
69
|
+
"vulnerabilityName": "Rapid7 Velociraptor Incorrect Default Permissions Vulnerability",
|
|
70
|
+
"dateAdded": "2025-10-14",
|
|
71
|
+
"shortDescription": "Rapid7 Velociraptor contains an incorrect default permissions vulnerability that can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint.",
|
|
72
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
73
|
+
"dueDate": "2025-11-04",
|
|
74
|
+
"knownRansomwareCampaignUse": "Known",
|
|
75
|
+
"notes": "https:\/\/docs.velociraptor.app\/announcements\/advisories\/cve-2025-6264\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6264",
|
|
76
|
+
"cwes": [
|
|
77
|
+
"CWE-276"
|
|
78
|
+
]
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
"cveID": "CVE-2016-7836",
|
|
82
|
+
"vendorProject": "SKYSEA",
|
|
83
|
+
"product": "Client View",
|
|
84
|
+
"vulnerabilityName": "SKYSEA Client View Improper Authentication Vulnerability",
|
|
85
|
+
"dateAdded": "2025-10-14",
|
|
86
|
+
"shortDescription": "SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.",
|
|
87
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
88
|
+
"dueDate": "2025-11-04",
|
|
89
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
90
|
+
"notes": "https:\/\/www.skyseaclientview.net\/news\/161221\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-7836",
|
|
91
|
+
"cwes": [
|
|
92
|
+
"CWE-287"
|
|
93
|
+
]
|
|
94
|
+
},
|
|
7
95
|
{
|
|
8
96
|
"cveID": "CVE-2021-43798",
|
|
9
97
|
"vendorProject": "Grafana Labs",
|
|
@@ -122,16 +122,6 @@ class Vulnerabilities(SynqlyModel):
|
|
|
122
122
|
if asset_filter:
|
|
123
123
|
self.logger.debug(f"Asset filter: {asset_filter}")
|
|
124
124
|
|
|
125
|
-
self.logger.info(f"Fetching vulnerability data from {self.integration_name}...")
|
|
126
|
-
findings = (
|
|
127
|
-
self.fetch_integration_data(
|
|
128
|
-
func=self.tenant.engine_client.vulnerabilities.query_findings,
|
|
129
|
-
filter=vuln_filter, # Only severity/date filters for findings
|
|
130
|
-
**kwargs,
|
|
131
|
-
)
|
|
132
|
-
if self.can_fetch_vulns
|
|
133
|
-
else []
|
|
134
|
-
)
|
|
135
125
|
self.logger.info(f"Fetching asset data from {self.integration_name}...")
|
|
136
126
|
assets = (
|
|
137
127
|
self.fetch_integration_data(
|
|
@@ -143,6 +133,17 @@ class Vulnerabilities(SynqlyModel):
|
|
|
143
133
|
else []
|
|
144
134
|
)
|
|
145
135
|
|
|
136
|
+
self.logger.info(f"Fetching vulnerability data from {self.integration_name}...")
|
|
137
|
+
findings = (
|
|
138
|
+
self.fetch_integration_data(
|
|
139
|
+
func=self.tenant.engine_client.vulnerabilities.query_findings,
|
|
140
|
+
filter=vuln_filter, # Only severity/date filters for findings
|
|
141
|
+
**kwargs,
|
|
142
|
+
)
|
|
143
|
+
if self.can_fetch_vulns
|
|
144
|
+
else []
|
|
145
|
+
)
|
|
146
|
+
|
|
146
147
|
self.scanner_integration = VulnerabilitiesIntegration(plan_id=regscale_ssp_id)
|
|
147
148
|
self.logger.info(f"Mapping {self.provider} asset(s) data to RegScale asset(s)...")
|
|
148
149
|
if assets:
|
|
@@ -5,7 +5,11 @@ from typing import Any, Union, TYPE_CHECKING, Optional
|
|
|
5
5
|
|
|
6
6
|
if TYPE_CHECKING:
|
|
7
7
|
from regscale.models.integration_models.synqly_models.connectors import Edr, Ticketing, Vulnerabilities
|
|
8
|
-
from synqly.engine.resources.ocsf.resources.v_1_3_0.resources.securityfinding import
|
|
8
|
+
from synqly.engine.resources.ocsf.resources.v_1_3_0.resources.securityfinding import (
|
|
9
|
+
Finding,
|
|
10
|
+
ResourceDetails,
|
|
11
|
+
Vulnerability,
|
|
12
|
+
)
|
|
9
13
|
|
|
10
14
|
from synqly import engine
|
|
11
15
|
from synqly.engine import CreateTicketRequest
|
|
@@ -152,7 +156,39 @@ class Mapper:
|
|
|
152
156
|
)
|
|
153
157
|
|
|
154
158
|
@staticmethod
|
|
155
|
-
def
|
|
159
|
+
def _determine_date(
|
|
160
|
+
attribute: str, finding: Optional["Finding"] = None, vuln: Optional["Vulnerability"] = None
|
|
161
|
+
) -> datetime:
|
|
162
|
+
"""
|
|
163
|
+
Determine the date based on the provided vulnerability or finding
|
|
164
|
+
|
|
165
|
+
:param str attribute: The attribute to determine the date for
|
|
166
|
+
:param Optional[SecurityFinding] finding: The finding to determine the date for
|
|
167
|
+
:param Optional[Vulnerability] vuln: The vulnerability to determine the date for
|
|
168
|
+
:return: The date
|
|
169
|
+
:rtype: datetime
|
|
170
|
+
"""
|
|
171
|
+
from regscale.core.utils.date import normalize_timestamp
|
|
172
|
+
|
|
173
|
+
vuln_date = getattr(vuln, attribute) if vuln else None
|
|
174
|
+
fallback_vuln_date = getattr(vuln, attribute.replace("_dt", ""), None) if vuln else None
|
|
175
|
+
finding_date = getattr(finding, attribute) if finding else None
|
|
176
|
+
fallback_finding_date = getattr(finding, attribute.replace("_dt", ""), None) if finding else None
|
|
177
|
+
if vuln_date:
|
|
178
|
+
return vuln_date
|
|
179
|
+
elif finding_date:
|
|
180
|
+
return finding_date
|
|
181
|
+
# No datetime objects, lets try the epoch integers
|
|
182
|
+
if fallback_vuln_date:
|
|
183
|
+
fallback_vuln_date = normalize_timestamp(fallback_vuln_date)
|
|
184
|
+
return datetime.fromtimestamp(fallback_vuln_date)
|
|
185
|
+
elif fallback_finding_date:
|
|
186
|
+
fallback_finding_date = normalize_timestamp(fallback_finding_date)
|
|
187
|
+
return datetime.fromtimestamp(fallback_finding_date)
|
|
188
|
+
else:
|
|
189
|
+
return datetime.now()
|
|
190
|
+
|
|
191
|
+
def _parse_finding_data(self, finding: "SecurityFinding", vuln: Optional["Vulnerability"] = None) -> dict:
|
|
156
192
|
"""
|
|
157
193
|
Parse the data from the SecurityFinding object
|
|
158
194
|
|
|
@@ -164,16 +200,20 @@ class Mapper:
|
|
|
164
200
|
|
|
165
201
|
finding_data = {
|
|
166
202
|
"cve": None,
|
|
167
|
-
"first_seen":
|
|
168
|
-
"last_seen":
|
|
203
|
+
"first_seen": self._determine_date("first_seen_time_dt", getattr(finding, "finding", None), vuln),
|
|
204
|
+
"last_seen": self._determine_date("last_seen_time_dt", getattr(finding, "finding", None), vuln),
|
|
169
205
|
"plugin_id": vuln.cve.uid if vuln else finding.finding.product_uid,
|
|
170
|
-
"severity":
|
|
206
|
+
"severity": vuln.severity if vuln and getattr(vuln, "severity") else finding.severity_id,
|
|
171
207
|
"remediation": getattr(vuln, "remediation") if vuln else finding.finding.remediation.desc,
|
|
172
208
|
}
|
|
173
209
|
if vuln:
|
|
174
210
|
finding_data["cve"] = vuln.cve.uid
|
|
175
211
|
else:
|
|
176
212
|
finding_data["cve"] = finding.finding.title if "cve" in finding.finding.title.lower() else None
|
|
213
|
+
try:
|
|
214
|
+
finding_data["severity"] = int(finding_data["severity"])
|
|
215
|
+
except ValueError:
|
|
216
|
+
finding_data["severity"] = 0
|
|
177
217
|
if isinstance(finding_data["remediation"], Remediation):
|
|
178
218
|
finding_data["remediation"] = finding_data["remediation"].desc
|
|
179
219
|
elif isinstance(finding_data["remediation"], dict):
|
|
@@ -227,9 +267,9 @@ class Mapper:
|
|
|
227
267
|
"""
|
|
228
268
|
base = vuln if vuln else finding.finding
|
|
229
269
|
finding_data = self._parse_finding_data(finding, vuln)
|
|
230
|
-
if resource
|
|
231
|
-
dns =
|
|
232
|
-
ip_address =
|
|
270
|
+
if resource_data := getattr(resource, "data"):
|
|
271
|
+
dns = resource_data.get("hostname")
|
|
272
|
+
ip_address = resource_data.get("ipv4")
|
|
233
273
|
else:
|
|
234
274
|
dns = resource.uid if vuln else None
|
|
235
275
|
ip_address = None
|
|
@@ -700,10 +700,7 @@ class SynqlyModel(BaseModel, ABC):
|
|
|
700
700
|
if query_filter:
|
|
701
701
|
query_filter = self.validate_filters(query_filter)
|
|
702
702
|
integration_data: list = []
|
|
703
|
-
fetch_res = func
|
|
704
|
-
filter=query_filter,
|
|
705
|
-
limit=limit,
|
|
706
|
-
)
|
|
703
|
+
fetch_res = self._fetch_data_with_retries(func=func, limit=limit, filter=query_filter)
|
|
707
704
|
self.logger.info(f"Received {len(fetch_res.result)} record(s) from {self.integration_name}.")
|
|
708
705
|
integration_data.extend(fetch_res.result)
|
|
709
706
|
# check and handle pagination
|
|
@@ -711,24 +708,49 @@ class SynqlyModel(BaseModel, ABC):
|
|
|
711
708
|
try:
|
|
712
709
|
# fetch.cursor can be an int as a string, or a continuation token
|
|
713
710
|
while int(fetch_res.cursor) == len(integration_data):
|
|
714
|
-
fetch_res =
|
|
715
|
-
filter=query_filter
|
|
716
|
-
limit=limit,
|
|
717
|
-
cursor=fetch_res.cursor,
|
|
711
|
+
fetch_res = self._fetch_data_with_retries(
|
|
712
|
+
func=func, limit=limit, cursor=fetch_res.cursor, filter=query_filter
|
|
718
713
|
)
|
|
719
714
|
integration_data.extend(fetch_res.result)
|
|
720
715
|
except ValueError:
|
|
721
716
|
while fetch_res.cursor:
|
|
722
|
-
fetch_res =
|
|
723
|
-
filter=query_filter
|
|
724
|
-
limit=limit,
|
|
725
|
-
cursor=fetch_res.cursor,
|
|
717
|
+
fetch_res = self._fetch_data_with_retries(
|
|
718
|
+
func=func, limit=limit, cursor=fetch_res.cursor, filter=query_filter
|
|
726
719
|
)
|
|
727
720
|
integration_data.extend(fetch_res.result)
|
|
728
721
|
self.logger.info(f"Received {len(integration_data)} record(s) from {self.integration_name}...")
|
|
729
722
|
self.logger.info(f"Fetched {len(integration_data)} total record(s) from {self.integration_name}...")
|
|
730
723
|
return integration_data
|
|
731
724
|
|
|
725
|
+
def _fetch_data_with_retries(
|
|
726
|
+
self, func: Callable, limit: int, cursor: Union[str, int, None] = None, filter: Optional[str] = None
|
|
727
|
+
) -> Any:
|
|
728
|
+
"""
|
|
729
|
+
Fetches data from the integration using the provided function and handles pagination
|
|
730
|
+
|
|
731
|
+
:param Callable func: The function to fetch data from the integration
|
|
732
|
+
:param int limit: The limit of records to fetch
|
|
733
|
+
:param Optional[str] filter: The filter to apply to the data
|
|
734
|
+
:return: The data from the integration
|
|
735
|
+
:rtype: Any
|
|
736
|
+
"""
|
|
737
|
+
import time
|
|
738
|
+
|
|
739
|
+
retries = 0
|
|
740
|
+
sleep_timers = [10, 20, 40]
|
|
741
|
+
while retries < 3:
|
|
742
|
+
try:
|
|
743
|
+
if cursor:
|
|
744
|
+
return func(limit=limit, filter=filter, cursor=cursor)
|
|
745
|
+
else:
|
|
746
|
+
return func(limit=limit, filter=filter)
|
|
747
|
+
except Exception as e:
|
|
748
|
+
self.logger.error(f"Error fetching data with retries: {e}")
|
|
749
|
+
self.logger.error(f"Retrying in {sleep_timers[retries]} seconds...")
|
|
750
|
+
time.sleep(sleep_timers[retries])
|
|
751
|
+
retries += 1
|
|
752
|
+
error_and_exit("Failed to fetch data after 3 retries")
|
|
753
|
+
|
|
732
754
|
def run_integration_sync(self, *args, **kwargs) -> None:
|
|
733
755
|
"""
|
|
734
756
|
Runs the sync process for the integration
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
regscale/__init__.py,sha256=ZygAIkX6Nbjag1czWdQa-yP-GM1mBE_9ss21Xh__JFc,34
|
|
2
|
-
regscale/_version.py,sha256=
|
|
2
|
+
regscale/_version.py,sha256=6rK1XbR7CtjKj4sB_xHT4DIZPLpY7LjaGjXRl6NJSqE,1198
|
|
3
3
|
regscale/regscale.py,sha256=4LzcbkBxPh23cCLANVEEr6uNoZ0sebHec0N-VJm5_vA,31480
|
|
4
4
|
regscale/airflow/__init__.py,sha256=yMwN0Bz4JbM0nl5qY_hPegxo_O2ilhTOL9PY5Njhn-s,270
|
|
5
5
|
regscale/airflow/click_dags.py,sha256=H3SUR5jkvInNMv1gu-VG-Ja_H-kH145CpQYNalWNAbE,4520
|
|
@@ -119,7 +119,7 @@ regscale/integrations/jsonl_scanner_integration.py,sha256=l8nq_T3rE1XX-6HxrNHm3x
|
|
|
119
119
|
regscale/integrations/milestone_manager.py,sha256=td5m-2LIUkHY7S3rtGwj-SLLuSGN4aiJOPAiKRcE4A4,10779
|
|
120
120
|
regscale/integrations/scanner_integration.py,sha256=VcHldJCmSIy0oGL0G5tF6ivnrLAUuhGgWisC_F24G3g,194028
|
|
121
121
|
regscale/integrations/variables.py,sha256=MfQ34WuYVN5437A9sZ2ssHRkA3gFhMHfk1DVasceGmY,2336
|
|
122
|
-
regscale/integrations/commercial/__init__.py,sha256=
|
|
122
|
+
regscale/integrations/commercial/__init__.py,sha256=9IWhVfJec2O67JJnFs5T0cM-nSxadgOdl7jcIGXnJDE,14532
|
|
123
123
|
regscale/integrations/commercial/ad.py,sha256=YXSmK8vRf6yi2GnREGa5GrE6GelhFrLj44SY8AO1pK0,15509
|
|
124
124
|
regscale/integrations/commercial/burp.py,sha256=3BLNKLfwL1x7jfhd8MJD6hdHEpj58pOEtrtCkn2hcWA,3344
|
|
125
125
|
regscale/integrations/commercial/cpe.py,sha256=vUHKGdq0UlR38pZWqqHLLTdDfooLtE9zIiFHdoFcUr0,5735
|
|
@@ -341,7 +341,7 @@ regscale/models/integration_models/azure_alerts.py,sha256=2etrpvcxa7jVQrc98bJlVG
|
|
|
341
341
|
regscale/models/integration_models/base64.py,sha256=sxV6O5qY1_TstJENX5jBPsSdQwmA83-NNhgJFunXiZE,570
|
|
342
342
|
regscale/models/integration_models/burp.py,sha256=FBEBkH3U0Q8vq71FFoWnvgLRF5Hkr9GYmQFmNNHFrVk,16932
|
|
343
343
|
regscale/models/integration_models/burp_models.py,sha256=UytDTAcCaxyu-knFkm_mEUH6UmWK3OTXKSC9Sc6OjVs,3669
|
|
344
|
-
regscale/models/integration_models/cisa_kev_data.json,sha256=
|
|
344
|
+
regscale/models/integration_models/cisa_kev_data.json,sha256=dlHfNHkBxZgSc9w6JR8tTFcqEQ33RVRMnwsDLqXcTZA,1301677
|
|
345
345
|
regscale/models/integration_models/defender_data.py,sha256=jsAcjKxiGmumGerj7xSWkFd6r__YpuKDnYX5o7xHDiE,2844
|
|
346
346
|
regscale/models/integration_models/defenderimport.py,sha256=Ze4kgwns-IYPyO7sBjEzW8PXWlxwU-DAo2fIyRcTC3k,6242
|
|
347
347
|
regscale/models/integration_models/drf.py,sha256=Aq7AdLa_CH97NrnR-CxaFI22JjVN9uCxVN7Z-BBUaNU,18896
|
|
@@ -375,15 +375,15 @@ regscale/models/integration_models/synqly_models/__init__.py,sha256=47DEQpj8HBSa
|
|
|
375
375
|
regscale/models/integration_models/synqly_models/capabilities.json,sha256=MqbVQ3qdu4cDHkAXF50zanx4CnFiIhIwW1Iw8CS-4j0,442882
|
|
376
376
|
regscale/models/integration_models/synqly_models/connector_types.py,sha256=8nxptkTexpskySnmL0obNAff_iu_fx6tJ7i1-4hJvao,461
|
|
377
377
|
regscale/models/integration_models/synqly_models/filter_parser.py,sha256=8rdnHH7gW1A_uWRTexZXzCH-HzRVy5nlvFgtc7ztcsQ,12160
|
|
378
|
-
regscale/models/integration_models/synqly_models/ocsf_mapper.py,sha256=
|
|
378
|
+
regscale/models/integration_models/synqly_models/ocsf_mapper.py,sha256=3M1O8yz0jBRav30lK8BU1xUL5STixetRSpIp5bWhRzg,18746
|
|
379
379
|
regscale/models/integration_models/synqly_models/param.py,sha256=Xt5Zm6lC_VkLj7LF2qXo72TJZHysqttsp5ai0NCf1po,2643
|
|
380
|
-
regscale/models/integration_models/synqly_models/synqly_model.py,sha256=
|
|
380
|
+
regscale/models/integration_models/synqly_models/synqly_model.py,sha256=RPxieh3r9dVdkt7IliiNEqEqvhbXv3UFuEEZ4-MNqGc,37965
|
|
381
381
|
regscale/models/integration_models/synqly_models/tenants.py,sha256=kewIZw-iv18bNXJGG3ghwuFJ4CK5iXQhn_x2-xvV0iM,1078
|
|
382
382
|
regscale/models/integration_models/synqly_models/connectors/__init__.py,sha256=J3YS7KXLnTPRzeM3lUQpy6HKH7CxPPsWCB-sPXSWcYA,189
|
|
383
383
|
regscale/models/integration_models/synqly_models/connectors/assets.py,sha256=HHNIAVh5pRuJe8sStqhFEc6VnX2wT0FcY5178nbQgkQ,3705
|
|
384
384
|
regscale/models/integration_models/synqly_models/connectors/edr.py,sha256=kio3uoEYubCHretpDOJqxdwmzid1IzbVYz0BF64zeL0,5547
|
|
385
385
|
regscale/models/integration_models/synqly_models/connectors/ticketing.py,sha256=yRBuCkRAVfa_C91r3WqJ9gxrQsoD0qV9cY48YXpJl70,25358
|
|
386
|
-
regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=
|
|
386
|
+
regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py,sha256=7fsPHtWSrHxlqAXGURvQ4VWunmAs-acz7O8ABHshdBw,8240
|
|
387
387
|
regscale/models/integration_models/tenable_models/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
388
388
|
regscale/models/integration_models/tenable_models/integration.py,sha256=lplL8zmjTFuhLreW-4y7G1fiCOBgzNAaATq800jgTQc,10271
|
|
389
389
|
regscale/models/integration_models/tenable_models/models.py,sha256=dmG7btkN4YkDWwnfW5Ldc3tWEAGjPiaRgJjrqMOkPEU,15846
|
|
@@ -635,9 +635,9 @@ tests/regscale/models/test_regscale_model.py,sha256=ZsrEZkC4EtdIsoQuayn1xv2gEGcV
|
|
|
635
635
|
tests/regscale/models/test_report.py,sha256=IqUq7C__a1_q_mLaz0PE9Lq6fHggBsB14-AzEYNBxLw,4666
|
|
636
636
|
tests/regscale/models/test_tenable_integrations.py,sha256=y1qaW77H094VSGHjZdlvF66UCt-nPEib9Mv3cdwbM94,32435
|
|
637
637
|
tests/regscale/models/test_user_model.py,sha256=e9olv28qBApgnvK6hFHOgXjUC-pkaV8aGDirEIWASL4,4427
|
|
638
|
-
regscale_cli-6.27.
|
|
639
|
-
regscale_cli-6.27.
|
|
640
|
-
regscale_cli-6.27.
|
|
641
|
-
regscale_cli-6.27.
|
|
642
|
-
regscale_cli-6.27.
|
|
643
|
-
regscale_cli-6.27.
|
|
638
|
+
regscale_cli-6.27.1.0.dist-info/LICENSE,sha256=ytNhYQ9Rmhj_m-EX2pPq9Ld6tH5wrqqDYg-fCf46WDU,1076
|
|
639
|
+
regscale_cli-6.27.1.0.dist-info/METADATA,sha256=ItM8t2M1p7hlbdNJ7vikZMDxLA0SmP1fxG_tqdQoUsw,34231
|
|
640
|
+
regscale_cli-6.27.1.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
|
|
641
|
+
regscale_cli-6.27.1.0.dist-info/entry_points.txt,sha256=cLOaIP1eRv1yZ2u7BvpE3aB4x3kDrDwkpeisKOu33z8,269
|
|
642
|
+
regscale_cli-6.27.1.0.dist-info/top_level.txt,sha256=Uv8VUCAdxRm70bgrD4YNEJUmDhBThad_1aaEFGwRByc,15
|
|
643
|
+
regscale_cli-6.27.1.0.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|