regscale-cli 6.28.0.0__py3-none-any.whl → 6.28.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/integrations/commercial/synqly/ticketing.py +27 -0
- regscale/models/integration_models/cisa_kev_data.json +34 -4
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/METADATA +1 -1
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/RECORD +10 -10
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.28.0.0.dist-info → regscale_cli-6.28.1.1.dist-info}/top_level.txt +0 -0
regscale/_version.py
CHANGED
|
@@ -49,6 +49,33 @@ def sync_freshdesk(regscale_id: int, regscale_module: str, name: str, subject: s
|
|
|
49
49
|
ticketing_freshdesk.run_sync(regscale_id=regscale_id, regscale_module=regscale_module, name=name, subject=subject)
|
|
50
50
|
|
|
51
51
|
|
|
52
|
+
@ticketing.command(name="sync_ivanti")
|
|
53
|
+
@regscale_id()
|
|
54
|
+
@regscale_module()
|
|
55
|
+
@click.option(
|
|
56
|
+
"--name",
|
|
57
|
+
type=click.STRING,
|
|
58
|
+
help="ivanti name",
|
|
59
|
+
required=True,
|
|
60
|
+
prompt="ivanti name",
|
|
61
|
+
)
|
|
62
|
+
@click.option(
|
|
63
|
+
"--sync_attachments",
|
|
64
|
+
type=click.BOOL,
|
|
65
|
+
help="Whether to sync attachments between Ivanti and RegScale",
|
|
66
|
+
required=False,
|
|
67
|
+
default=True,
|
|
68
|
+
)
|
|
69
|
+
def sync_ivanti(regscale_id: int, regscale_module: str, name: str, sync_attachments: bool) -> None:
|
|
70
|
+
"""Sync Ticketing data between Ivanti and RegScale."""
|
|
71
|
+
from regscale.models.integration_models.synqly_models.connectors import Ticketing
|
|
72
|
+
|
|
73
|
+
ticketing_ivanti = Ticketing("ivanti")
|
|
74
|
+
ticketing_ivanti.run_sync(
|
|
75
|
+
regscale_id=regscale_id, regscale_module=regscale_module, name=name, sync_attachments=sync_attachments
|
|
76
|
+
)
|
|
77
|
+
|
|
78
|
+
|
|
52
79
|
@ticketing.command(name="sync_jira")
|
|
53
80
|
@regscale_id()
|
|
54
81
|
@regscale_module()
|
|
@@ -1,9 +1,39 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.10.
|
|
4
|
-
"dateReleased": "2025-10-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.10.30",
|
|
4
|
+
"dateReleased": "2025-10-30T17:58:16.1627Z",
|
|
5
|
+
"count": 1453,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-41244",
|
|
9
|
+
"vendorProject": "Broadcom",
|
|
10
|
+
"product": "VMware Aria Operations and VMware Tools",
|
|
11
|
+
"vulnerabilityName": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability",
|
|
12
|
+
"dateAdded": "2025-10-30",
|
|
13
|
+
"shortDescription": "Broadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-11-20",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36149 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41244",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-267"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2025-24893",
|
|
24
|
+
"vendorProject": "XWiki",
|
|
25
|
+
"product": "Platform",
|
|
26
|
+
"vulnerabilityName": "XWiki Platform Eval Injection Vulnerability",
|
|
27
|
+
"dateAdded": "2025-10-30",
|
|
28
|
+
"shortDescription": "XWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-11-20",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/github.com\/xwiki\/xwiki-platform\/security\/advisories\/GHSA-rr6p-3pfg-562j ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24893",
|
|
33
|
+
"cwes": [
|
|
34
|
+
"CWE-95"
|
|
35
|
+
]
|
|
36
|
+
},
|
|
7
37
|
{
|
|
8
38
|
"cveID": "CVE-2025-6204",
|
|
9
39
|
"vendorProject": "Dassault Syst\u00e8mes",
|
|
@@ -4980,7 +5010,7 @@
|
|
|
4980
5010
|
"shortDescription": "Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.",
|
|
4981
5011
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
4982
5012
|
"dueDate": "2024-06-20",
|
|
4983
|
-
"knownRansomwareCampaignUse": "
|
|
5013
|
+
"knownRansomwareCampaignUse": "Known",
|
|
4984
5014
|
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-1086",
|
|
4985
5015
|
"cwes": [
|
|
4986
5016
|
"CWE-416"
|