diff --git a/Packs/ARIAPacketIntelligence/Integrations/ARIAPacketIntelligence/ARIAPacketIntelligence.yml b/Packs/ARIAPacketIntelligence/Integrations/ARIAPacketIntelligence/ARIAPacketIntelligence.yml index b9c8a26917f..42d496adca2 100644 --- a/Packs/ARIAPacketIntelligence/Integrations/ARIAPacketIntelligence/ARIAPacketIntelligence.yml +++ b/Packs/ARIAPacketIntelligence/Integrations/ARIAPacketIntelligence/ARIAPacketIntelligence.yml @@ -906,7 +906,7 @@ script: description: 'Endpoint information, such as the IP address, about the SIAs that were modified based on the rule change.' type: string description: Removes a named rule from the source subnet logic block, disabling the alerts. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false tests: - No test diff --git a/Packs/ARIAPacketIntelligence/ReleaseNotes/2_0_16.md b/Packs/ARIAPacketIntelligence/ReleaseNotes/2_0_16.md new file mode 100644 index 00000000000..46d9493bb9c --- /dev/null +++ b/Packs/ARIAPacketIntelligence/ReleaseNotes/2_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ARIA Packet Intelligence + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ARIAPacketIntelligence/pack_metadata.json b/Packs/ARIAPacketIntelligence/pack_metadata.json index d2cf55c481c..27af6a1311e 100644 --- a/Packs/ARIAPacketIntelligence/pack_metadata.json +++ b/Packs/ARIAPacketIntelligence/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ARIAPacketIntelligence", "description": "Manage Packet Intelligence rules in response to incidents. Instantly block conversations, redirect packets, generate alerts, or perform other actions.", "support": "partner", - "currentVersion": "2.0.15", + "currentVersion": "2.0.16", "author": "ARIA Cybersecurity Solutions", "url": "https://www.ariacybersecurity.com/cybersecurity-products/aria-packet-intelligence", "email": "ARIA_support@ariacybersecurity.com", diff --git a/Packs/AbnormalSecurity/Integrations/AbnormalSecurity/AbnormalSecurity.yml b/Packs/AbnormalSecurity/Integrations/AbnormalSecurity/AbnormalSecurity.yml index 7540d24a4f8..36bc0d26da2 100644 --- a/Packs/AbnormalSecurity/Integrations/AbnormalSecurity/AbnormalSecurity.yml +++ b/Packs/AbnormalSecurity/Integrations/AbnormalSecurity/AbnormalSecurity.yml @@ -759,7 +759,7 @@ script: description: Get the latest threat intel feed. name: abnormal-security-get-latest-threat-intel-feed deprecated: true - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 script: "" subtype: python3 type: python diff --git a/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml b/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml index 5a74f758769..676f97a41ec 100644 --- a/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml +++ b/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml @@ -42,7 +42,7 @@ script: - 'True' - 'False' required: true - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true subtype: python3 fromversion: 6.8.0 diff --git a/Packs/AbnormalSecurity/ReleaseNotes/2_2_11.md b/Packs/AbnormalSecurity/ReleaseNotes/2_2_11.md new file mode 100644 index 00000000000..be2e4925649 --- /dev/null +++ b/Packs/AbnormalSecurity/ReleaseNotes/2_2_11.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Abnormal Security Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Abnormal Security + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AbnormalSecurity/pack_metadata.json b/Packs/AbnormalSecurity/pack_metadata.json index 67e79f41a33..f10d844cd9e 100644 --- a/Packs/AbnormalSecurity/pack_metadata.json +++ b/Packs/AbnormalSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Abnormal Security", "description": "Abnormal Security detects and protects against the whole spectrum of email attacks", "support": "partner", - "currentVersion": "2.2.10", + "currentVersion": "2.2.11", "author": "Abnormal Security", "url": "", "email": "support@abnormalsecurity.com", diff --git a/Packs/AcalvioShadowplex/Integrations/acalvioapp/acalvioapp.yml b/Packs/AcalvioShadowplex/Integrations/acalvioapp/acalvioapp.yml index 367f502ee1a..d077a151990 100644 --- a/Packs/AcalvioShadowplex/Integrations/acalvioapp/acalvioapp.yml +++ b/Packs/AcalvioShadowplex/Integrations/acalvioapp/acalvioapp.yml @@ -148,7 +148,7 @@ script: - contextPath: Acalvio.UnmuteDeceptionEndpoint.DateTime description: Date including Time type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AcalvioShadowplex/ReleaseNotes/1_0_15.md b/Packs/AcalvioShadowplex/ReleaseNotes/1_0_15.md new file mode 100644 index 00000000000..ad2af221e4f --- /dev/null +++ b/Packs/AcalvioShadowplex/ReleaseNotes/1_0_15.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Acalvio ShadowPlex + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AcalvioShadowplex/pack_metadata.json b/Packs/AcalvioShadowplex/pack_metadata.json index 2517062ae63..ee5b2f40ac4 100644 --- a/Packs/AcalvioShadowplex/pack_metadata.json +++ b/Packs/AcalvioShadowplex/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Acalvio ShadowPlex", "description": "Acalvio ShadowPlex Autonomous Deception Solution", "support": "partner", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "Acalvio Technologies", "url": "https://www.acalvio.com", "email": "support@acalvio.com", diff --git a/Packs/AccentureCTI/Integrations/ACTIIndicatorQuery/ACTIIndicatorQuery.yml b/Packs/AccentureCTI/Integrations/ACTIIndicatorQuery/ACTIIndicatorQuery.yml index fed0884cddf..5382bf4111a 100644 --- a/Packs/AccentureCTI/Integrations/ACTIIndicatorQuery/ACTIIndicatorQuery.yml +++ b/Packs/AccentureCTI/Integrations/ACTIIndicatorQuery/ACTIIndicatorQuery.yml @@ -400,7 +400,7 @@ script: - contextPath: DBotScore.Score description: The actual score. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AccentureCTI/ReleaseNotes/2_2_38.md b/Packs/AccentureCTI/ReleaseNotes/2_2_38.md new file mode 100644 index 00000000000..e9899453514 --- /dev/null +++ b/Packs/AccentureCTI/ReleaseNotes/2_2_38.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### ACTI Indicator Query + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### FormatACTIURL + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AccentureCTI/Scripts/FormatACTIURL/FormatACTIURL.yml b/Packs/AccentureCTI/Scripts/FormatACTIURL/FormatACTIURL.yml index 525accf1b2c..5fcff61813a 100644 --- a/Packs/AccentureCTI/Scripts/FormatACTIURL/FormatACTIURL.yml +++ b/Packs/AccentureCTI/Scripts/FormatACTIURL/FormatACTIURL.yml @@ -10,7 +10,7 @@ comment: Helps to fetch ACTI Intelligence Report/Alert URL and converts it to uu enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.5.0 tests: diff --git a/Packs/AccentureCTI/pack_metadata.json b/Packs/AccentureCTI/pack_metadata.json index 6af86e23c83..2dc73b57588 100644 --- a/Packs/AccentureCTI/pack_metadata.json +++ b/Packs/AccentureCTI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Accenture CTI v2", "description": "Accenture CTI provides intelligence regarding security threats and vulnerabilities.", "support": "partner", - "currentVersion": "2.2.37", + "currentVersion": "2.2.38", "author": "Accenture", "url": "https://www.accenture.com/us-en/services/security/cyber-defense", "email": "CTI.AcctManagement@accenture.com", diff --git a/Packs/AgariPhishingDefense/Integrations/AgariPhishingDefense/AgariPhishingDefense.yml b/Packs/AgariPhishingDefense/Integrations/AgariPhishingDefense/AgariPhishingDefense.yml index e8624a9574a..584d3884538 100644 --- a/Packs/AgariPhishingDefense/Integrations/AgariPhishingDefense/AgariPhishingDefense.yml +++ b/Packs/AgariPhishingDefense/Integrations/AgariPhishingDefense/AgariPhishingDefense.yml @@ -323,7 +323,7 @@ script: required: true description: Remediate suspected message. name: apd-remediate-message - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/AgariPhishingDefense/ReleaseNotes/1_1_17.md b/Packs/AgariPhishingDefense/ReleaseNotes/1_1_17.md new file mode 100644 index 00000000000..c46cfb6f8c4 --- /dev/null +++ b/Packs/AgariPhishingDefense/ReleaseNotes/1_1_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Agari Phishing Defense + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AgariPhishingDefense/pack_metadata.json b/Packs/AgariPhishingDefense/pack_metadata.json index 2b0d2a11931..e522c450a00 100644 --- a/Packs/AgariPhishingDefense/pack_metadata.json +++ b/Packs/AgariPhishingDefense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Agari Phishing Defense", "description": "Use the Agari Phishing Defense integration to retrieve Policy Events as Incidents, retrieve messages and remediate suspected messages.", "support": "partner", - "currentVersion": "1.1.16", + "currentVersion": "1.1.17", "author": "Agari", "url": "https://www.agari.com/support/", "email": "support@agari.com", diff --git a/Packs/AppNovi/Integrations/appNovi/appNovi.yml b/Packs/AppNovi/Integrations/appNovi/appNovi.yml index 03f38873745..0bd22ecd8d9 100644 --- a/Packs/AppNovi/Integrations/appNovi/appNovi.yml +++ b/Packs/AppNovi/Integrations/appNovi/appNovi.yml @@ -401,7 +401,7 @@ script: type: textArea description: Server IP to search. description: Search for servers using IP address. - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.5.0 diff --git a/Packs/AppNovi/ReleaseNotes/1_0_26.md b/Packs/AppNovi/ReleaseNotes/1_0_26.md new file mode 100644 index 00000000000..d5e2f86ab4c --- /dev/null +++ b/Packs/AppNovi/ReleaseNotes/1_0_26.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### appNovi + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AppNovi/pack_metadata.json b/Packs/AppNovi/pack_metadata.json index e5a1bc562e6..d17c4c3e849 100644 --- a/Packs/AppNovi/pack_metadata.json +++ b/Packs/AppNovi/pack_metadata.json @@ -1,54 +1,63 @@ { - "name": "AppNovi", - "description": "Search your combined security data in appNovi via simplified search or search via the appNovi security graph.", - "support": "partner", - "currentVersion": "1.0.25", - "author": "appNovi", - "url": "https://appnovi.com/support", - "email": "", - "categories": ["Analytics & SIEM"], - "tags": [], - "useCases": [], - "keywords": [ - "Asset intelligence", - "Asset attribution", - "Cybersecurity mesh", - "Cybersecurity mesh architecture", - "CSMA", - "CAASM", - "SIEM integration", - "vulnerability prioritization", - "vulnerability correlation", - "attack surface mapping", - "attack surface identification", - "Incident response enrichment", - "Incident response analysis", - "Excel replacement", - "Incident response reporting", - "CIS control 1", - "CIS control 2", - "CIS control 7", - "CIS control 13", - "Security data visualization", - "Security data analysis", - "Security data", - "Asset reporting" - ], - "marketplaces": ["xsoar", "marketplacev2"], - "githubUser": [], - "dependencies": { - "CommonTypes": { - "mandatory": true, - "display_name": "Common Types" + "name": "AppNovi", + "description": "Search your combined security data in appNovi via simplified search or search via the appNovi security graph.", + "support": "partner", + "currentVersion": "1.0.26", + "author": "appNovi", + "url": "https://appnovi.com/support", + "email": "", + "categories": [ + "Analytics & SIEM" + ], + "tags": [], + "useCases": [], + "keywords": [ + "Asset intelligence", + "Asset attribution", + "Cybersecurity mesh", + "Cybersecurity mesh architecture", + "CSMA", + "CAASM", + "SIEM integration", + "vulnerability prioritization", + "vulnerability correlation", + "attack surface mapping", + "attack surface identification", + "Incident response enrichment", + "Incident response analysis", + "Excel replacement", + "Incident response reporting", + "CIS control 1", + "CIS control 2", + "CIS control 7", + "CIS control 13", + "Security data visualization", + "Security data analysis", + "Security data", + "Asset reporting" + ], + "marketplaces": [ + "xsoar", + "marketplacev2" + ], + "githubUser": [], + "dependencies": { + "CommonTypes": { + "mandatory": true, + "display_name": "Common Types" + }, + "CoreAlertFields": { + "mandatory": true, + "display_name": "Core Alert Fields" + }, + "CommonScripts": { + "mandatory": true, + "display_name": "Common Scripts" + } }, - "CoreAlertFields": { - "mandatory": true, - "display_name": "Core Alert Fields" - }, - "CommonScripts": { - "mandatory": true, - "display_name": "Common Scripts" - } - }, - "displayedImages": ["CommonTypes", "CoreAlertFields", "CommonScripts"] -} + "displayedImages": [ + "CommonTypes", + "CoreAlertFields", + "CommonScripts" + ] +} \ No newline at end of file diff --git a/Packs/ArcusTeam/Integrations/ArcusTeam/ArcusTeam.yml b/Packs/ArcusTeam/Integrations/ArcusTeam/ArcusTeam.yml index 67a273e602c..6b8b48ad012 100644 --- a/Packs/ArcusTeam/Integrations/ArcusTeam/ArcusTeam.yml +++ b/Packs/ArcusTeam/Integrations/ArcusTeam/ArcusTeam.yml @@ -166,7 +166,7 @@ script: description: CVE url. type: string description: 'Retrieve CVEs for an ArcusTeam device.' - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 fromversion: 6.0.0 tests: diff --git a/Packs/ArcusTeam/ReleaseNotes/1_0_11.md b/Packs/ArcusTeam/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..bea74736629 --- /dev/null +++ b/Packs/ArcusTeam/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ArcusTeam + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ArcusTeam/pack_metadata.json b/Packs/ArcusTeam/pack_metadata.json index 10a2605cff0..b81b7caeaa4 100644 --- a/Packs/ArcusTeam/pack_metadata.json +++ b/Packs/ArcusTeam/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ArcusTeam", "description": "ArcusTeam's DeviceTotal Platform helps to identify and manage vulnerabilities found on IoT devices", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "ArcusTeam", "url": "https://arcusteam.com/pa-partnership/", "email": "support@arcusteam.com", diff --git a/Packs/Ataya/Integrations/Ataya/Ataya.yml b/Packs/Ataya/Integrations/Ataya/Ataya.yml index 5afd619df6c..700b7d4dfe7 100644 --- a/Packs/Ataya/Integrations/Ataya/Ataya.yml +++ b/Packs/Ataya/Integrations/Ataya/Ataya.yml @@ -39,7 +39,7 @@ script: description: the cilient imsi which need to be assigned. description: approve user to access external network. name: ataya-assign-user - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Ataya/ReleaseNotes/1_0_7.md b/Packs/Ataya/ReleaseNotes/1_0_7.md new file mode 100644 index 00000000000..77cf6ae48fb --- /dev/null +++ b/Packs/Ataya/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Ataya Harmony + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Ataya/pack_metadata.json b/Packs/Ataya/pack_metadata.json index 458e672d7be..a2dfdae5ede 100644 --- a/Packs/Ataya/pack_metadata.json +++ b/Packs/Ataya/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ataya", "description": "Integrate with Ataya Harmony for manage the 5G UE session", "support": "partner", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Ataya Inc.", "url": "https://ataya.io", "email": "", @@ -19,4 +19,4 @@ "marketplacev2" ], "githubUser": "tony19911010" -} +} \ No newline at end of file diff --git a/Packs/AttivoBotsink/Integrations/AttivoBotsink/AttivoBotsink.yml b/Packs/AttivoBotsink/Integrations/AttivoBotsink/AttivoBotsink.yml index 8193b61749f..90ab8c62eff 100644 --- a/Packs/AttivoBotsink/Integrations/AttivoBotsink/AttivoBotsink.yml +++ b/Packs/AttivoBotsink/Integrations/AttivoBotsink/AttivoBotsink.yml @@ -182,7 +182,7 @@ script: description: List all deceptive users. isfetch: true runonce: false - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 tests: - AttivoBotsinkTest fromversion: 5.0.0 diff --git a/Packs/AttivoBotsink/ReleaseNotes/1_0_16.md b/Packs/AttivoBotsink/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..2b9b6bdd195 --- /dev/null +++ b/Packs/AttivoBotsink/ReleaseNotes/1_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Attivo Botsink + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/AttivoBotsink/pack_metadata.json b/Packs/AttivoBotsink/pack_metadata.json index fc7023c4d96..e18e5f9f02d 100644 --- a/Packs/AttivoBotsink/pack_metadata.json +++ b/Packs/AttivoBotsink/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Attivo Botsink", "description": "Network-based Threat Deception for Post-Compromise Threat Detection.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Attivo Networks", "url": "https://www.attivonetworks.com", "email": "support@attivonetworks.com", diff --git a/Packs/Automox/Integrations/Automox/Automox.yml b/Packs/Automox/Integrations/Automox/Automox.yml index c9e03bb1bae..15fd7c5714b 100644 --- a/Packs/Automox/Integrations/Automox/Automox.yml +++ b/Packs/Automox/Integrations/Automox/Automox.yml @@ -830,7 +830,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests diff --git a/Packs/Automox/ReleaseNotes/1_0_18.md b/Packs/Automox/ReleaseNotes/1_0_18.md new file mode 100644 index 00000000000..428809d4aed --- /dev/null +++ b/Packs/Automox/ReleaseNotes/1_0_18.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Automox +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Automox/pack_metadata.json b/Packs/Automox/pack_metadata.json index f918c980758..c04d2af92b3 100644 --- a/Packs/Automox/pack_metadata.json +++ b/Packs/Automox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Automox", "description": "This pack empowers you with comprehensive solutions to manage your Automox device fleet with ease!", "support": "partner", - "currentVersion": "1.0.17", + "currentVersion": "1.0.18", "author": "Automox Inc.", "url": "https://www.automox.com/", "email": "support@automox.com", diff --git a/Packs/BMCDiscovery/Integrations/BMCDiscovery/BMCDiscovery.yml b/Packs/BMCDiscovery/Integrations/BMCDiscovery/BMCDiscovery.yml index 8dc9149b7df..19349451122 100644 --- a/Packs/BMCDiscovery/Integrations/BMCDiscovery/BMCDiscovery.yml +++ b/Packs/BMCDiscovery/Integrations/BMCDiscovery/BMCDiscovery.yml @@ -276,7 +276,7 @@ script: type: Unknown description: Get detailed scan (run) results - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/BMCDiscovery/ReleaseNotes/1_0_8.md b/Packs/BMCDiscovery/ReleaseNotes/1_0_8.md new file mode 100644 index 00000000000..522f70a856b --- /dev/null +++ b/Packs/BMCDiscovery/ReleaseNotes/1_0_8.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### BMC Discovery +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/BMCDiscovery/pack_metadata.json b/Packs/BMCDiscovery/pack_metadata.json index bb74451bbb0..86011efcdb8 100644 --- a/Packs/BMCDiscovery/pack_metadata.json +++ b/Packs/BMCDiscovery/pack_metadata.json @@ -2,7 +2,7 @@ "name": "BMC Discovery", "description": "BMC Discovery integration allows searching for endpoints information, triggering Discovery runs and running custom user queries.", "support": "partner", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "ScienceSoft USA Corporation", "url": "https://www.scnsoft.com/", "email": "qlean@scnsoft.com", diff --git a/Packs/BastilleNetworks/Integrations/BastilleNetworks/BastilleNetworks.yml b/Packs/BastilleNetworks/Integrations/BastilleNetworks/BastilleNetworks.yml index 3f27939a4dd..6f6a5d4db22 100644 --- a/Packs/BastilleNetworks/Integrations/BastilleNetworks/BastilleNetworks.yml +++ b/Packs/BastilleNetworks/Integrations/BastilleNetworks/BastilleNetworks.yml @@ -260,7 +260,7 @@ script: required: true description: Command to remove tag from an existing device name: bastille-remove-device-tag - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/BastilleNetworks/ReleaseNotes/1_0_16.md b/Packs/BastilleNetworks/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..eb498acdc27 --- /dev/null +++ b/Packs/BastilleNetworks/ReleaseNotes/1_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Bastille Networks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/BastilleNetworks/pack_metadata.json b/Packs/BastilleNetworks/pack_metadata.json index 739feb608f3..6ed0daccaa3 100644 --- a/Packs/BastilleNetworks/pack_metadata.json +++ b/Packs/BastilleNetworks/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bastille Networks", "description": "RF monitoring for wireless intrusion detection and policy enforcement. Visit https://www.bastille.net for details.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Bastille Networks", "url": "https://www.bastille.net/support", "email": "ask-customer-support@bastille.io", diff --git a/Packs/Binalyze/Integrations/BinalyzeAIR/BinalyzeAIR.yml b/Packs/Binalyze/Integrations/BinalyzeAIR/BinalyzeAIR.yml index 98853b89868..4acf977cbc5 100644 --- a/Packs/Binalyze/Integrations/BinalyzeAIR/BinalyzeAIR.yml +++ b/Packs/Binalyze/Integrations/BinalyzeAIR/BinalyzeAIR.yml @@ -97,7 +97,7 @@ script: description: Organization Id of endpoint. type: number description: Acquire evidence from an endpoint. - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 fromversion: 6.2.0 tests: diff --git a/Packs/Binalyze/ReleaseNotes/1_1_8.md b/Packs/Binalyze/ReleaseNotes/1_1_8.md new file mode 100644 index 00000000000..82ae2777ddd --- /dev/null +++ b/Packs/Binalyze/ReleaseNotes/1_1_8.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Binalyze AIR +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Binalyze/pack_metadata.json b/Packs/Binalyze/pack_metadata.json index 32589052c9c..7bdb00c2b94 100644 --- a/Packs/Binalyze/pack_metadata.json +++ b/Packs/Binalyze/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Binalyze AIR", "description": "Collect over 300 different types of evidence under 10 minutes.", "support": "partner", - "currentVersion": "1.1.7", + "currentVersion": "1.1.8", "author": "Binalyze Integration Team", "url": "https://kb.binalyze.com/air/integrations/cortex-xsoar-integration", "email": "support@binalyze.com", @@ -24,4 +24,4 @@ "githubUser": [ "binalyze-murat" ] -} +} \ No newline at end of file diff --git a/Packs/BitSight/Integrations/BitSightForSecurityPerformanceManagement/BitSightForSecurityPerformanceManagement.yml b/Packs/BitSight/Integrations/BitSightForSecurityPerformanceManagement/BitSightForSecurityPerformanceManagement.yml index de059e68cb0..3c030842398 100644 --- a/Packs/BitSight/Integrations/BitSightForSecurityPerformanceManagement/BitSightForSecurityPerformanceManagement.yml +++ b/Packs/BitSight/Integrations/BitSightForSecurityPerformanceManagement/BitSightForSecurityPerformanceManagement.yml @@ -542,7 +542,7 @@ script: - contextPath: BitSight.MyCompany.guid description: The unique identifier of my company. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/BitSight/ReleaseNotes/1_1_22.md b/Packs/BitSight/ReleaseNotes/1_1_22.md new file mode 100644 index 00000000000..d9d48f9422f --- /dev/null +++ b/Packs/BitSight/ReleaseNotes/1_1_22.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Bitsight for Security Performance Management + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/BitSight/pack_metadata.json b/Packs/BitSight/pack_metadata.json index d81c07cf006..5e96addc5f8 100644 --- a/Packs/BitSight/pack_metadata.json +++ b/Packs/BitSight/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bitsight", "description": "Bitsight Integration will allow you visibility into Bitsight findings for remediation in your security program.", "support": "partner", - "currentVersion": "1.1.21", + "currentVersion": "1.1.22", "author": "Bitsight", "url": "https://service.bitsighttech.com/", "email": "support@bitsight.com", diff --git a/Packs/BluelivThreatCompass/Integrations/BluelivThreatCompass/BluelivThreatCompass.yml b/Packs/BluelivThreatCompass/Integrations/BluelivThreatCompass/BluelivThreatCompass.yml index 1490900baea..26deb668f0d 100644 --- a/Packs/BluelivThreatCompass/Integrations/BluelivThreatCompass/BluelivThreatCompass.yml +++ b/Packs/BluelivThreatCompass/Integrations/BluelivThreatCompass/BluelivThreatCompass.yml @@ -244,7 +244,7 @@ script: - contextPath: BluelivThreatCompass.Label.TextColor description: Hexadecimal color of the label text in the GUI. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/BluelivThreatCompass/ReleaseNotes/1_0_13.md b/Packs/BluelivThreatCompass/ReleaseNotes/1_0_13.md new file mode 100644 index 00000000000..6363eb395a9 --- /dev/null +++ b/Packs/BluelivThreatCompass/ReleaseNotes/1_0_13.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Blueliv ThreatCompass +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/BluelivThreatCompass/pack_metadata.json b/Packs/BluelivThreatCompass/pack_metadata.json index d1a42a2565c..0dc59891c17 100644 --- a/Packs/BluelivThreatCompass/pack_metadata.json +++ b/Packs/BluelivThreatCompass/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Blueliv ThreatCompass", "description": "Blueliv ThreatCompass systematically looks for information about companies,products, people, brands, logos, assets, technology and other information, depending on your needs. Blueliv ThreatCompass allows you to monitor and track all this information to keep your data, your organization and its employees safe", "support": "community", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Oriol Campderrós", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Brandefense/Integrations/Brandefense/Brandefense.yml b/Packs/Brandefense/Integrations/Brandefense/Brandefense.yml index abefaef0692..b77824cfc5d 100644 --- a/Packs/Brandefense/Integrations/Brandefense/Brandefense.yml +++ b/Packs/Brandefense/Integrations/Brandefense/Brandefense.yml @@ -163,7 +163,7 @@ script: outputs: - contextPath: branddefense_all_incidents description: All incidents from the Brandefense platform. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Brandefense/ReleaseNotes/1_0_1.md b/Packs/Brandefense/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..be2934bf362 --- /dev/null +++ b/Packs/Brandefense/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Brandefense + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Brandefense/pack_metadata.json b/Packs/Brandefense/pack_metadata.json index f44dd4571c9..7166785fc86 100644 --- a/Packs/Brandefense/pack_metadata.json +++ b/Packs/Brandefense/pack_metadata.json @@ -2,15 +2,23 @@ "name": "Brandefense", "description": "Branddefense is looking for data for each brand and collecting information and alarming the related brand about dark web finding (credentials, similar domain names etc.) related to the firm.With Brandefense integration it is possible to automate Brand related alarms and breach notifications, actions and much more.", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "asimsarpkurt", "url": "https://app.brandefense.io/", "email": "asimsarpkurt@gmail.com", "created": "2023-12-25T14:59:45Z", - "categories": ["Network Security"], - "tags": ["Security"], - "useCases": ["Breach Notification"], - "keywords": ["Threat Intelligence"], + "categories": [ + "Network Security" + ], + "tags": [ + "Security" + ], + "useCases": [ + "Breach Notification" + ], + "keywords": [ + "Threat Intelligence" + ], "marketplaces": [ "xsoar", "marketplacev2" @@ -18,4 +26,4 @@ "githubUser": [ "asimsarpkurt" ] -} +} \ No newline at end of file diff --git a/Packs/CIRCLHashlookup/Integrations/CIRCLEHashlookup/CIRCLEHashlookup.yml b/Packs/CIRCLHashlookup/Integrations/CIRCLEHashlookup/CIRCLEHashlookup.yml index 7181022fdab..7d3ee97ab04 100644 --- a/Packs/CIRCLHashlookup/Integrations/CIRCLEHashlookup/CIRCLEHashlookup.yml +++ b/Packs/CIRCLHashlookup/Integrations/CIRCLEHashlookup/CIRCLEHashlookup.yml @@ -137,7 +137,7 @@ script: - contextPath: Circl.Top description: The top 100 of most queried values. type: string - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 script: '' subtype: python3 type: python diff --git a/Packs/CIRCLHashlookup/ReleaseNotes/1_0_6.md b/Packs/CIRCLHashlookup/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..94faf2e46b0 --- /dev/null +++ b/Packs/CIRCLHashlookup/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CIRCLEHashlookup + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CIRCLHashlookup/pack_metadata.json b/Packs/CIRCLHashlookup/pack_metadata.json index 9d2422303a4..babb3830537 100644 --- a/Packs/CIRCLHashlookup/pack_metadata.json +++ b/Packs/CIRCLHashlookup/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CIRCL hashlookup (hashlookup.circl.lu)", "description": "CIRCL hash lookup is a public API to lookup hash values against known database of files. NSRL RDS database is included and many others are also included. The API is accessible via HTTP ReST API and the API is also described as an OpenAPI. The service is free and served as a best-effort basis.", "support": "community", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Harri Ruuttila", "url": "", "email": "", diff --git a/Packs/CSCDomainManager/Integrations/CSCDomainManager/CSCDomainManager.yml b/Packs/CSCDomainManager/Integrations/CSCDomainManager/CSCDomainManager.yml index 1886436ea93..8ce70b24142 100644 --- a/Packs/CSCDomainManager/Integrations/CSCDomainManager/CSCDomainManager.yml +++ b/Packs/CSCDomainManager/Integrations/CSCDomainManager/CSCDomainManager.yml @@ -667,7 +667,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.98471 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 tests: - CSCDomainManager_Test diff --git a/Packs/CSCDomainManager/ReleaseNotes/1_0_4.md b/Packs/CSCDomainManager/ReleaseNotes/1_0_4.md new file mode 100644 index 00000000000..8631baf355c --- /dev/null +++ b/Packs/CSCDomainManager/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CSCDomainManager + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CSCDomainManager/pack_metadata.json b/Packs/CSCDomainManager/pack_metadata.json index 9bf32c60747..2fc3a11b163 100644 --- a/Packs/CSCDomainManager/pack_metadata.json +++ b/Packs/CSCDomainManager/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CSCDomainManager", "description": "CSCDomainManager is the world's first multilingual domain management tool, available in English, French, and German. It uses rules-based technology, customizable reporting, granular user management, and more to enable you to manage your domain.", "support": "partner", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "CSC", "url": "https://www.cscdbs.com", "email": "domain_api_support@cscglobal.com", @@ -17,4 +17,4 @@ "marketplacev2", "xpanse" ] -} +} \ No newline at end of file diff --git a/Packs/CTIX/Integrations/CTIX/CTIX.yml b/Packs/CTIX/Integrations/CTIX/CTIX.yml index 6261a9017a2..24afa848b48 100644 --- a/Packs/CTIX/Integrations/CTIX/CTIX.yml +++ b/Packs/CTIX/Integrations/CTIX/CTIX.yml @@ -784,7 +784,7 @@ script: - contextPath: CTIX.Intel.status description: Status code returned from the api. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - No tests diff --git a/Packs/CTIX/Integrations/CTIXv3/CTIXv3.yml b/Packs/CTIX/Integrations/CTIXv3/CTIXv3.yml index 14f17be3b31..7677f439b73 100644 --- a/Packs/CTIX/Integrations/CTIXv3/CTIXv3.yml +++ b/Packs/CTIX/Integrations/CTIXv3/CTIXv3.yml @@ -1859,7 +1859,7 @@ script: - contextPath: DBotScore.Score description: The actual score. type: Number - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - No tests (auto formatted) diff --git a/Packs/CTIX/ReleaseNotes/2_2_17.md b/Packs/CTIX/ReleaseNotes/2_2_17.md new file mode 100644 index 00000000000..d08dae30faa --- /dev/null +++ b/Packs/CTIX/ReleaseNotes/2_2_17.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Cyware Threat Intelligence eXchange + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### CTIX v3 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CTIX/pack_metadata.json b/Packs/CTIX/pack_metadata.json index 5cf59f1efac..9b535b6871b 100644 --- a/Packs/CTIX/pack_metadata.json +++ b/Packs/CTIX/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CTIX", "description": "Cyware Threat Intelligence eXchange", "support": "partner", - "currentVersion": "2.2.16", + "currentVersion": "2.2.17", "author": "Cyware Labs", "url": "https://cyware.com/", "email": "connector-dev@cyware.com", diff --git a/Packs/CTM360-CyberBlindspot/Integrations/CyberBlindspot/CyberBlindspot.yml b/Packs/CTM360-CyberBlindspot/Integrations/CyberBlindspot/CyberBlindspot.yml index 45866f7d521..ddcde1596fa 100644 --- a/Packs/CTM360-CyberBlindspot/Integrations/CyberBlindspot/CyberBlindspot.yml +++ b/Packs/CTM360-CyberBlindspot/Integrations/CyberBlindspot/CyberBlindspot.yml @@ -150,7 +150,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/CTM360-CyberBlindspot/ReleaseNotes/1_0_1.md b/Packs/CTM360-CyberBlindspot/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..559dad6d34f --- /dev/null +++ b/Packs/CTM360-CyberBlindspot/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CTM360 CyberBlindspot + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CTM360-CyberBlindspot/pack_metadata.json b/Packs/CTM360-CyberBlindspot/pack_metadata.json index 6d71c646e2f..dbd8ec9569e 100644 --- a/Packs/CTM360-CyberBlindspot/pack_metadata.json +++ b/Packs/CTM360-CyberBlindspot/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CTM360 CyberBlindspot", "description": "Take action on incidents derived from threat intelligence that is directly linked to your organization.", "support": "partner", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "CTM360", "url": "https://www.ctm360.com", "email": "xsoar@ctm360.com", diff --git a/Packs/CadoResponse/Integrations/CadoResponse/CadoResponse.yml b/Packs/CadoResponse/Integrations/CadoResponse/CadoResponse.yml index 297e7a382f7..8669edefb2a 100644 --- a/Packs/CadoResponse/Integrations/CadoResponse/CadoResponse.yml +++ b/Packs/CadoResponse/Integrations/CadoResponse/CadoResponse.yml @@ -195,7 +195,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: "6.0.0" tests: - No tests (auto formatted) diff --git a/Packs/CadoResponse/ReleaseNotes/1_0_6.md b/Packs/CadoResponse/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..44489633662 --- /dev/null +++ b/Packs/CadoResponse/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cado Response + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CadoResponse/pack_metadata.json b/Packs/CadoResponse/pack_metadata.json index df9841eae2a..0abf8f36161 100644 --- a/Packs/CadoResponse/pack_metadata.json +++ b/Packs/CadoResponse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cado Response", "description": "Automate data collection. Process data at cloud speed. Analyze with purpose.", "support": "partner", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Cado Security", "url": "https://docs.cadosecurity.com/docs/cado-response/integrations/cortex-xsoar/", "email": "contact@cadosecurity.com", diff --git a/Packs/CaseManagement-Generic/ReleaseNotes/1_4_9.md b/Packs/CaseManagement-Generic/ReleaseNotes/1_4_9.md new file mode 100644 index 00000000000..cbe05569aa1 --- /dev/null +++ b/Packs/CaseManagement-Generic/ReleaseNotes/1_4_9.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### CloseLinkedIncidentsPostProcessing + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CaseManagement-Generic/Scripts/CloseLinkedIncidentsPostProcessing/CloseLinkedIncidentsPostProcessing.yml b/Packs/CaseManagement-Generic/Scripts/CloseLinkedIncidentsPostProcessing/CloseLinkedIncidentsPostProcessing.yml index 12c27011790..fd58de77d76 100644 --- a/Packs/CaseManagement-Generic/Scripts/CloseLinkedIncidentsPostProcessing/CloseLinkedIncidentsPostProcessing.yml +++ b/Packs/CaseManagement-Generic/Scripts/CloseLinkedIncidentsPostProcessing/CloseLinkedIncidentsPostProcessing.yml @@ -2,7 +2,7 @@ comment: 'Post Processing Script that will close linked Incidents when the Incid commonfields: id: CloseLinkedIncidentsPostProcessing version: -1 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: CloseLinkedIncidentsPostProcessing runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/pack_metadata.json b/Packs/CaseManagement-Generic/pack_metadata.json index d8424804285..1e99dae19f5 100644 --- a/Packs/CaseManagement-Generic/pack_metadata.json +++ b/Packs/CaseManagement-Generic/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CaseManagement-Generic", "description": "Case Management - Generic\n\nBuilt by the Cortex Customer Success Team to provide quick deployment of Case Management with XSOAR", "support": "community", - "currentVersion": "1.4.8", + "currentVersion": "1.4.9", "author": "Cortex XSOAR Customer Success", "url": "", "email": "", diff --git a/Packs/CheckPointHEC/ReleaseNotes/1_1_5.md b/Packs/CheckPointHEC/ReleaseNotes/1_1_5.md new file mode 100644 index 00000000000..df3d9733b4f --- /dev/null +++ b/Packs/CheckPointHEC/ReleaseNotes/1_1_5.md @@ -0,0 +1,15 @@ + +#### Scripts + +##### ShowCPEmailInfo + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RunCPPhishingCampaign + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ShowCPScanInfo + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### SendCPAction + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CheckPointHEC/Scripts/RunCPPhishingCampaign/RunCPPhishingCampaign.yml b/Packs/CheckPointHEC/Scripts/RunCPPhishingCampaign/RunCPPhishingCampaign.yml index 47e0587959f..c15e32bceac 100644 --- a/Packs/CheckPointHEC/Scripts/RunCPPhishingCampaign/RunCPPhishingCampaign.yml +++ b/Packs/CheckPointHEC/Scripts/RunCPPhishingCampaign/RunCPPhishingCampaign.yml @@ -29,7 +29,7 @@ args: scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/CheckPointHEC/Scripts/SendCPAction/SendCPAction.yml b/Packs/CheckPointHEC/Scripts/SendCPAction/SendCPAction.yml index 7c5c36d3de3..b1535c6071b 100644 --- a/Packs/CheckPointHEC/Scripts/SendCPAction/SendCPAction.yml +++ b/Packs/CheckPointHEC/Scripts/SendCPAction/SendCPAction.yml @@ -25,7 +25,7 @@ dependson: must: - CheckPointHEC|||checkpointhec-send-action runonce: false -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/CheckPointHEC/Scripts/ShowCPEmailInfo/ShowCPEmailInfo.yml b/Packs/CheckPointHEC/Scripts/ShowCPEmailInfo/ShowCPEmailInfo.yml index d0ad6bdd552..5e7367a541a 100644 --- a/Packs/CheckPointHEC/Scripts/ShowCPEmailInfo/ShowCPEmailInfo.yml +++ b/Packs/CheckPointHEC/Scripts/ShowCPEmailInfo/ShowCPEmailInfo.yml @@ -13,7 +13,7 @@ dependson: must: - CheckPointHEC|||checkpointhec-get-entity runonce: false -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/CheckPointHEC/Scripts/ShowCPScanInfo/ShowCPScanInfo.yml b/Packs/CheckPointHEC/Scripts/ShowCPScanInfo/ShowCPScanInfo.yml index e26220b550e..66fc1e6fc73 100644 --- a/Packs/CheckPointHEC/Scripts/ShowCPScanInfo/ShowCPScanInfo.yml +++ b/Packs/CheckPointHEC/Scripts/ShowCPScanInfo/ShowCPScanInfo.yml @@ -13,7 +13,7 @@ dependson: must: - CheckPointHEC|||checkpointhec-get-scan-info runonce: false -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/CheckPointHEC/pack_metadata.json b/Packs/CheckPointHEC/pack_metadata.json index acf0e3f7f4b..eecf36c1859 100644 --- a/Packs/CheckPointHEC/pack_metadata.json +++ b/Packs/CheckPointHEC/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Check Point Harmony Email and Collaboration (HEC)", "description": "The Best Way to Protect Enterprise Email & Collaboration from phishing, malware, account takeover, data loss, etc.", "support": "partner", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "Check Point Harmony Email & Collaboration (HEC)", "url": "https://supportcenter.checkpoint.com/", "email": "EmailSecurity_Support@checkpoint.com", diff --git a/Packs/CimTrak-SystemIntegrityAssurance/Integrations/CimTrak/CimTrak.yml b/Packs/CimTrak-SystemIntegrityAssurance/Integrations/CimTrak/CimTrak.yml index 4f38ee632c2..43bf6321600 100644 --- a/Packs/CimTrak-SystemIntegrityAssurance/Integrations/CimTrak/CimTrak.yml +++ b/Packs/CimTrak-SystemIntegrityAssurance/Integrations/CimTrak/CimTrak.yml @@ -2302,7 +2302,7 @@ script: - contextPath: CimTrak.Object.agentObjectId description: Agent Object Id. type: number - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true longRunning: true script: '' diff --git a/Packs/CimTrak-SystemIntegrityAssurance/ReleaseNotes/1_0_16.md b/Packs/CimTrak-SystemIntegrityAssurance/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..2f6f13e3c25 --- /dev/null +++ b/Packs/CimTrak-SystemIntegrityAssurance/ReleaseNotes/1_0_16.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### CimTrak - System Integrity Assurance +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/CimTrak-SystemIntegrityAssurance/pack_metadata.json b/Packs/CimTrak-SystemIntegrityAssurance/pack_metadata.json index 3ae4e628f95..8e13b9f0e6d 100644 --- a/Packs/CimTrak-SystemIntegrityAssurance/pack_metadata.json +++ b/Packs/CimTrak-SystemIntegrityAssurance/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CimTrak - System Integrity Assurance", "description": "The CimTrak integration helps you detect unexpected system/device/config modifications and automatically respond/react to threats", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Cimcor", "url": "www.cimcor.com", "email": "support@cimcor.com", diff --git a/Packs/Claroty/Integrations/Claroty/Claroty.yml b/Packs/Claroty/Integrations/Claroty/Claroty.yml index 78175d5c379..be67d220d30 100644 --- a/Packs/Claroty/Integrations/Claroty/Claroty.yml +++ b/Packs/Claroty/Integrations/Claroty/Claroty.yml @@ -407,7 +407,7 @@ script: - contextPath: Claroty.Alert.Severity description: The alert severity. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Claroty/ReleaseNotes/1_0_28.md b/Packs/Claroty/ReleaseNotes/1_0_28.md new file mode 100644 index 00000000000..5e6ee29b877 --- /dev/null +++ b/Packs/Claroty/ReleaseNotes/1_0_28.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Claroty + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Claroty/pack_metadata.json b/Packs/Claroty/pack_metadata.json index 646c8bb2792..d52794cd342 100644 --- a/Packs/Claroty/pack_metadata.json +++ b/Packs/Claroty/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Claroty", "description": "Use the Claroty CTD to manage assets and alerts.", "support": "partner", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Claroty", "url": "", "email": "support@claroty.com", diff --git a/Packs/CofenseIntelligenceV2/Integrations/CofenseIntelligenceV2/CofenseIntelligenceV2.yml b/Packs/CofenseIntelligenceV2/Integrations/CofenseIntelligenceV2/CofenseIntelligenceV2.yml index 275f2ee7ba9..6fd3e926e7e 100644 --- a/Packs/CofenseIntelligenceV2/Integrations/CofenseIntelligenceV2/CofenseIntelligenceV2.yml +++ b/Packs/CofenseIntelligenceV2/Integrations/CofenseIntelligenceV2/CofenseIntelligenceV2.yml @@ -1491,7 +1491,7 @@ script: - contextPath: File.Extension description: The file extension. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CofenseIntelligenceV2/ReleaseNotes/1_1_17.md b/Packs/CofenseIntelligenceV2/ReleaseNotes/1_1_17.md new file mode 100644 index 00000000000..529b86f2f91 --- /dev/null +++ b/Packs/CofenseIntelligenceV2/ReleaseNotes/1_1_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cofense Intelligence v2 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CofenseIntelligenceV2/pack_metadata.json b/Packs/CofenseIntelligenceV2/pack_metadata.json index 858e6c5afe7..e7499d82a82 100644 --- a/Packs/CofenseIntelligenceV2/pack_metadata.json +++ b/Packs/CofenseIntelligenceV2/pack_metadata.json @@ -2,22 +2,28 @@ "name": "Cofense Intelligence v2", "description": "Cofense Intelligence allows users to search for threat intelligence reports based on domains, IPs, email address, file hashes, URLs and extracted strings.", "support": "partner", - "currentVersion": "1.1.16", + "currentVersion": "1.1.17", "author": "Cofense", "url": "https://cofense.com/contact-support/", "email": "support@cofense.com", "categories": [ - "Data Enrichment & Threat Intelligence" + "Data Enrichment & Threat Intelligence" + ], + "tags": [ + "Malware" ], - "tags": ["Malware"], "useCases": [], - "keywords": ["Cofense", "Phishing", "Intelligence", "Malware"], + "keywords": [ + "Cofense", + "Phishing", + "Intelligence", + "Malware" + ], "githubUser": [ - "elebow" + "elebow" ], - "marketplaces": [ - "xsoar", - "marketplacev2" - ] - } - \ No newline at end of file + "marketplaces": [ + "xsoar", + "marketplacev2" + ] +} \ No newline at end of file diff --git a/Packs/CofenseTriage/Integrations/CofenseTriagev3/CofenseTriagev3.yml b/Packs/CofenseTriage/Integrations/CofenseTriagev3/CofenseTriagev3.yml index 0a4371c888a..959a33b429e 100644 --- a/Packs/CofenseTriage/Integrations/CofenseTriagev3/CofenseTriagev3.yml +++ b/Packs/CofenseTriage/Integrations/CofenseTriagev3/CofenseTriagev3.yml @@ -1825,7 +1825,7 @@ script: - contextPath: File.Extension description: The file extension. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true isremotesyncin: true runonce: false diff --git a/Packs/CofenseTriage/ReleaseNotes/2_1_31.md b/Packs/CofenseTriage/ReleaseNotes/2_1_31.md new file mode 100644 index 00000000000..ae50bec7cf8 --- /dev/null +++ b/Packs/CofenseTriage/ReleaseNotes/2_1_31.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Cofense Triage v3 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### CofenseTriageThreatEnrichment + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### CofenseTriageReportDownload + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CofenseTriage/Scripts/CofenseTriageReportDownload/CofenseTriageReportDownload.yml b/Packs/CofenseTriage/Scripts/CofenseTriageReportDownload/CofenseTriageReportDownload.yml index 913af7b85e6..ecef8b3869f 100644 --- a/Packs/CofenseTriage/Scripts/CofenseTriageReportDownload/CofenseTriageReportDownload.yml +++ b/Packs/CofenseTriage/Scripts/CofenseTriageReportDownload/CofenseTriageReportDownload.yml @@ -19,7 +19,7 @@ dependson: must: - '|||cofense-report-list' - '|||cofense-report-download' -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/CofenseTriage/Scripts/CofenseTriageThreatEnrichment/CofenseTriageThreatEnrichment.yml b/Packs/CofenseTriage/Scripts/CofenseTriageThreatEnrichment/CofenseTriageThreatEnrichment.yml index 3565585c89d..97f6b571085 100644 --- a/Packs/CofenseTriage/Scripts/CofenseTriageThreatEnrichment/CofenseTriageThreatEnrichment.yml +++ b/Packs/CofenseTriage/Scripts/CofenseTriageThreatEnrichment/CofenseTriageThreatEnrichment.yml @@ -18,7 +18,7 @@ subtype: python3 dependson: must: - '|||cofense-threat-indicator-list' -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/CofenseTriage/pack_metadata.json b/Packs/CofenseTriage/pack_metadata.json index a954aa6969d..2bd065f60ff 100644 --- a/Packs/CofenseTriage/pack_metadata.json +++ b/Packs/CofenseTriage/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cofense Triage", "description": "Cofense Triage allows users to fetch reports by using the fetch incidents capability. It also provides commands to get entities like reporters, rules, categories, and more.", "support": "partner", - "currentVersion": "2.1.30", + "currentVersion": "2.1.31", "author": "Cofense", "url": "https://cofense.com/contact-support/", "email": "support@cofense.com", diff --git a/Packs/CofenseVision/Integrations/CofenseVision/CofenseVision.yml b/Packs/CofenseVision/Integrations/CofenseVision/CofenseVision.yml index bbfa8872db4..9e65906332e 100644 --- a/Packs/CofenseVision/Integrations/CofenseVision/CofenseVision.yml +++ b/Packs/CofenseVision/Integrations/CofenseVision/CofenseVision.yml @@ -2382,7 +2382,7 @@ script: - contextPath: Cofense.Config.value description: List of headers that are available to create a message search. type: Unknown - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CofenseVision/ReleaseNotes/1_0_13.md b/Packs/CofenseVision/ReleaseNotes/1_0_13.md new file mode 100644 index 00000000000..16d8cc7f7c9 --- /dev/null +++ b/Packs/CofenseVision/ReleaseNotes/1_0_13.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Cofense Vision + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### GetMessageIdAndRecipients + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConvertDictOfListToListOfDict + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CofenseVision/Scripts/ConvertDictOfListToListOfDict/ConvertDictOfListToListOfDict.yml b/Packs/CofenseVision/Scripts/ConvertDictOfListToListOfDict/ConvertDictOfListToListOfDict.yml index efdeac24136..5d6b3c9fc36 100644 --- a/Packs/CofenseVision/Scripts/ConvertDictOfListToListOfDict/ConvertDictOfListToListOfDict.yml +++ b/Packs/CofenseVision/Scripts/ConvertDictOfListToListOfDict/ConvertDictOfListToListOfDict.yml @@ -14,7 +14,7 @@ args: description: Object Key. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/CofenseVision/Scripts/GetMessageIdAndRecipients/GetMessageIdAndRecipients.yml b/Packs/CofenseVision/Scripts/GetMessageIdAndRecipients/GetMessageIdAndRecipients.yml index d485f0674c9..f377efe2427 100644 --- a/Packs/CofenseVision/Scripts/GetMessageIdAndRecipients/GetMessageIdAndRecipients.yml +++ b/Packs/CofenseVision/Scripts/GetMessageIdAndRecipients/GetMessageIdAndRecipients.yml @@ -18,7 +18,7 @@ outputs: type: Unknown scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/CofenseVision/pack_metadata.json b/Packs/CofenseVision/pack_metadata.json index 5dc33d3bb94..b2066e4b66e 100644 --- a/Packs/CofenseVision/pack_metadata.json +++ b/Packs/CofenseVision/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cofense Vision", "description": "Cofense Vision empowers security teams to hunt for email messages and quarantine threats in mailboxes. Analysts can setup jobs to remove emerging phishing campaigns based on trusted and credible IOCs through an automated workflow.", "support": "partner", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Cofense", "url": "https://cofense.com/contact-support/", "email": "support@cofense.com", diff --git a/Packs/CohesityHelios/Integrations/CohesityHelios/CohesityHelios.yml b/Packs/CohesityHelios/Integrations/CohesityHelios/CohesityHelios.yml index 5dba1c338df..09b18edd7ef 100644 --- a/Packs/CohesityHelios/Integrations/CohesityHelios/CohesityHelios.yml +++ b/Packs/CohesityHelios/Integrations/CohesityHelios/CohesityHelios.yml @@ -131,7 +131,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/CohesityHelios/Integrations/CohesityHeliosEventCollector/CohesityHeliosEventCollector.yml b/Packs/CohesityHelios/Integrations/CohesityHeliosEventCollector/CohesityHeliosEventCollector.yml index 3be204b695d..07d27b16e4f 100644 --- a/Packs/CohesityHelios/Integrations/CohesityHeliosEventCollector/CohesityHeliosEventCollector.yml +++ b/Packs/CohesityHelios/Integrations/CohesityHeliosEventCollector/CohesityHeliosEventCollector.yml @@ -79,7 +79,7 @@ script: description: Gets events from Cohesity Helios. execution: false name: cohesity-helios-get-events - dockerimage: demisto/python3:3.10.13.89009 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true runonce: false script: '-' diff --git a/Packs/CohesityHelios/ReleaseNotes/1_1_2.md b/Packs/CohesityHelios/ReleaseNotes/1_1_2.md new file mode 100644 index 00000000000..6826fb6a743 --- /dev/null +++ b/Packs/CohesityHelios/ReleaseNotes/1_1_2.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Cohesity Helios Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### CohesityHelios + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CohesityHelios/pack_metadata.json b/Packs/CohesityHelios/pack_metadata.json index 74bc24547dc..37f69623676 100644 --- a/Packs/CohesityHelios/pack_metadata.json +++ b/Packs/CohesityHelios/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cohesity Helios", "description": "This integration interacts with Cohesity Helios and performs actions based on alerts raised.", "support": "partner", - "currentVersion": "1.1.1", + "currentVersion": "1.1.2", "author": "Cohesity Inc.", "url": "https://www.cohesity.com", "email": "support@cohesity.com", diff --git a/Packs/CommunityCommonDashboards/ReleaseNotes/2_0_8.md b/Packs/CommunityCommonDashboards/ReleaseNotes/2_0_8.md new file mode 100644 index 00000000000..5df2eab37df --- /dev/null +++ b/Packs/CommunityCommonDashboards/ReleaseNotes/2_0_8.md @@ -0,0 +1,9 @@ + +#### Scripts + +##### XMetricsTotal + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### XMetricsYear + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CommunityCommonDashboards/Scripts/XMetricsTotal/XMetricsTotal.yml b/Packs/CommunityCommonDashboards/Scripts/XMetricsTotal/XMetricsTotal.yml index b3611e7fdfa..d968bf019be 100644 --- a/Packs/CommunityCommonDashboards/Scripts/XMetricsTotal/XMetricsTotal.yml +++ b/Packs/CommunityCommonDashboards/Scripts/XMetricsTotal/XMetricsTotal.yml @@ -13,7 +13,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.13.89009 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: XMetricsTotal diff --git a/Packs/CommunityCommonDashboards/Scripts/XMetricsYear/XMetricsYear.yml b/Packs/CommunityCommonDashboards/Scripts/XMetricsYear/XMetricsYear.yml index 2ecbac7116d..1fe56e3256f 100644 --- a/Packs/CommunityCommonDashboards/Scripts/XMetricsYear/XMetricsYear.yml +++ b/Packs/CommunityCommonDashboards/Scripts/XMetricsYear/XMetricsYear.yml @@ -8,7 +8,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.13.89009 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: XMetricsYear diff --git a/Packs/CommunityCommonDashboards/pack_metadata.json b/Packs/CommunityCommonDashboards/pack_metadata.json index 1fb7e3c280b..2ab1107dcd5 100644 --- a/Packs/CommunityCommonDashboards/pack_metadata.json +++ b/Packs/CommunityCommonDashboards/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Community Common Dashboards", "description": "A pack that contains community dashboards", "support": "community", - "currentVersion": "2.0.7", + "currentVersion": "2.0.8", "author": "Randy Uhrlaub", "url": "", "email": "", diff --git a/Packs/CommunityCommonScripts/ReleaseNotes/1_3_6.md b/Packs/CommunityCommonScripts/ReleaseNotes/1_3_6.md new file mode 100644 index 00000000000..bd12e05b7d6 --- /dev/null +++ b/Packs/CommunityCommonScripts/ReleaseNotes/1_3_6.md @@ -0,0 +1,36 @@ + +#### Scripts + +##### ExtFilter + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### GetListDatawithKeyword + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RemoveEmptyEvidence + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### GetAskLinks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### DateTimeNowToEpoch + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RetrievePlaybookDependencies + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### DeleteIncidentsByQuery + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### GetIndexOfArrayValue + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### GetIndicatorDBotScoreFromContext + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### redactindicator + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### CreateEDLInstance + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CommunityCommonScripts/Scripts/CreateEDLInstance/CreateEDLInstance.yml b/Packs/CommunityCommonScripts/Scripts/CreateEDLInstance/CreateEDLInstance.yml index 560e51a605a..c210126c158 100644 --- a/Packs/CommunityCommonScripts/Scripts/CreateEDLInstance/CreateEDLInstance.yml +++ b/Packs/CommunityCommonScripts/Scripts/CreateEDLInstance/CreateEDLInstance.yml @@ -15,7 +15,7 @@ comment: Use this automation to create an EDL instance on XSOAR. commonfields: id: CreateEDLInstance version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: CreateEDLInstance runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/DateTimeNowToEpoch/DateTimeNowToEpoch.yml b/Packs/CommunityCommonScripts/Scripts/DateTimeNowToEpoch/DateTimeNowToEpoch.yml index 33a20378c52..9746998a3e1 100644 --- a/Packs/CommunityCommonScripts/Scripts/DateTimeNowToEpoch/DateTimeNowToEpoch.yml +++ b/Packs/CommunityCommonScripts/Scripts/DateTimeNowToEpoch/DateTimeNowToEpoch.yml @@ -14,7 +14,7 @@ outputs: scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/CommunityCommonScripts/Scripts/DeleteIncidentsByQuery/DeleteIncidentsByQuery.yml b/Packs/CommunityCommonScripts/Scripts/DeleteIncidentsByQuery/DeleteIncidentsByQuery.yml index c99ec5feb36..59601bcf8a7 100644 --- a/Packs/CommunityCommonScripts/Scripts/DeleteIncidentsByQuery/DeleteIncidentsByQuery.yml +++ b/Packs/CommunityCommonScripts/Scripts/DeleteIncidentsByQuery/DeleteIncidentsByQuery.yml @@ -13,7 +13,7 @@ contentitemexportablefields: fromServerVersion: "" dependson: must: [] -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: DeleteIncidentsByQuery runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/ExtFilter/ExtFilter.yml b/Packs/CommunityCommonScripts/Scripts/ExtFilter/ExtFilter.yml index dc21aa7b37d..2ff55a8cbd8 100644 --- a/Packs/CommunityCommonScripts/Scripts/ExtFilter/ExtFilter.yml +++ b/Packs/CommunityCommonScripts/Scripts/ExtFilter/ExtFilter.yml @@ -164,7 +164,7 @@ args: description: '`demisto` context: Input ''incident'' (no quotation) on `From previous tasks` to enable ${incident.} expression in DT.' scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/CommunityCommonScripts/Scripts/GetAskLinks/GetAskLinks.yml b/Packs/CommunityCommonScripts/Scripts/GetAskLinks/GetAskLinks.yml index 532812ce0c9..0ecc62f1a54 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetAskLinks/GetAskLinks.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetAskLinks/GetAskLinks.yml @@ -26,7 +26,7 @@ script: '-' timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.87159 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/CommunityCommonScripts/Scripts/GetIndexOfArrayValue/GetIndexOfArrayValue.yml b/Packs/CommunityCommonScripts/Scripts/GetIndexOfArrayValue/GetIndexOfArrayValue.yml index c3cc416229b..9cf48d6e7b6 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetIndexOfArrayValue/GetIndexOfArrayValue.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetIndexOfArrayValue/GetIndexOfArrayValue.yml @@ -15,7 +15,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: GetIndexOfArrayValue runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/GetIndicatorDBotScoreFromContext/GetIndicatorDBotScoreFromContext.yml b/Packs/CommunityCommonScripts/Scripts/GetIndicatorDBotScoreFromContext/GetIndicatorDBotScoreFromContext.yml index 6dfb99bfc4f..84043e85a07 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetIndicatorDBotScoreFromContext/GetIndicatorDBotScoreFromContext.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetIndicatorDBotScoreFromContext/GetIndicatorDBotScoreFromContext.yml @@ -32,7 +32,7 @@ outputs: type: string scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/CommunityCommonScripts/Scripts/GetListDatawithKeyword/GetListDatawithKeyword.yml b/Packs/CommunityCommonScripts/Scripts/GetListDatawithKeyword/GetListDatawithKeyword.yml index ff640d2abf1..cf7bb6d3ccd 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetListDatawithKeyword/GetListDatawithKeyword.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetListDatawithKeyword/GetListDatawithKeyword.yml @@ -28,7 +28,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: GetListDatawithKeyword runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/RedactIndicator/RedactIndicator.yml b/Packs/CommunityCommonScripts/Scripts/RedactIndicator/RedactIndicator.yml index ec46ed70dcd..302367cae68 100644 --- a/Packs/CommunityCommonScripts/Scripts/RedactIndicator/RedactIndicator.yml +++ b/Packs/CommunityCommonScripts/Scripts/RedactIndicator/RedactIndicator.yml @@ -14,7 +14,7 @@ name: redactindicator script: '' subtype: python3 type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/CommunityCommonScripts/Scripts/RemoveEmptyEvidence/RemoveEmptyEvidence.yml b/Packs/CommunityCommonScripts/Scripts/RemoveEmptyEvidence/RemoveEmptyEvidence.yml index a20601a205b..e926456ff17 100644 --- a/Packs/CommunityCommonScripts/Scripts/RemoveEmptyEvidence/RemoveEmptyEvidence.yml +++ b/Packs/CommunityCommonScripts/Scripts/RemoveEmptyEvidence/RemoveEmptyEvidence.yml @@ -11,7 +11,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RemoveEmptyEvidence runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/RetrievePlaybookDependencies/RetrievePlaybookDependencies.yml b/Packs/CommunityCommonScripts/Scripts/RetrievePlaybookDependencies/RetrievePlaybookDependencies.yml index 22fb1713797..296d0437b88 100644 --- a/Packs/CommunityCommonScripts/Scripts/RetrievePlaybookDependencies/RetrievePlaybookDependencies.yml +++ b/Packs/CommunityCommonScripts/Scripts/RetrievePlaybookDependencies/RetrievePlaybookDependencies.yml @@ -46,7 +46,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RetrievePlaybookDependencies outputs: diff --git a/Packs/CommunityCommonScripts/pack_metadata.json b/Packs/CommunityCommonScripts/pack_metadata.json index 581dcd9af35..f3ce00eeb17 100644 --- a/Packs/CommunityCommonScripts/pack_metadata.json +++ b/Packs/CommunityCommonScripts/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Community Common Scripts", "description": "A pack that contains community scripts", "support": "community", - "currentVersion": "1.3.5", + "currentVersion": "1.3.6", "author": "", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Confluera/Integrations/Confluera/Confluera.yml b/Packs/Confluera/Integrations/Confluera/Confluera.yml index f21a7da19bb..48bd9489ca1 100644 --- a/Packs/Confluera/Integrations/Confluera/Confluera.yml +++ b/Packs/Confluera/Integrations/Confluera/Confluera.yml @@ -55,7 +55,7 @@ script: - contextPath: Confluera.TrailDetails description: Progression Details description: Fetches progression details of which provided trailId is a part of. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 fromversion: 6.0.0 diff --git a/Packs/Confluera/ReleaseNotes/1_0_15.md b/Packs/Confluera/ReleaseNotes/1_0_15.md new file mode 100644 index 00000000000..878430e9e7f --- /dev/null +++ b/Packs/Confluera/ReleaseNotes/1_0_15.md @@ -0,0 +1,36 @@ + +#### Integrations + +##### Confluera + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### ConflueraProgressionsData + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraProgressionsCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraDetectionsSummaryWarroom + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraDetectionsDataWarroom + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### IqHubLog + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraDetectionsData + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraDetectionsCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraDetectionsSummary + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConflueraProgressionsDataWarroom + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Confluera/Scripts/ConflueraDetectionsCount/ConflueraDetectionsCount.yml b/Packs/Confluera/Scripts/ConflueraDetectionsCount/ConflueraDetectionsCount.yml index 4401f00d01b..2050b872275 100644 --- a/Packs/Confluera/Scripts/ConflueraDetectionsCount/ConflueraDetectionsCount.yml +++ b/Packs/Confluera/Scripts/ConflueraDetectionsCount/ConflueraDetectionsCount.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-detections should: - Confluera|||confluera-fetch-detections -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraDetectionsData/ConflueraDetectionsData.yml b/Packs/Confluera/Scripts/ConflueraDetectionsData/ConflueraDetectionsData.yml index af1ebb717f9..c80fe7d650d 100644 --- a/Packs/Confluera/Scripts/ConflueraDetectionsData/ConflueraDetectionsData.yml +++ b/Packs/Confluera/Scripts/ConflueraDetectionsData/ConflueraDetectionsData.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-detections should: - Confluera|||confluera-fetch-detections -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraDetectionsDataWarroom/ConflueraDetectionsDataWarroom.yml b/Packs/Confluera/Scripts/ConflueraDetectionsDataWarroom/ConflueraDetectionsDataWarroom.yml index 84c8a1964a2..59861a0c04c 100644 --- a/Packs/Confluera/Scripts/ConflueraDetectionsDataWarroom/ConflueraDetectionsDataWarroom.yml +++ b/Packs/Confluera/Scripts/ConflueraDetectionsDataWarroom/ConflueraDetectionsDataWarroom.yml @@ -16,7 +16,7 @@ dependson: - Confluera|||confluera-fetch-detections should: - Confluera|||confluera-fetch-detections -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraDetectionsSummary/ConflueraDetectionsSummary.yml b/Packs/Confluera/Scripts/ConflueraDetectionsSummary/ConflueraDetectionsSummary.yml index 3de0f7fe00e..e87eda8fb4a 100644 --- a/Packs/Confluera/Scripts/ConflueraDetectionsSummary/ConflueraDetectionsSummary.yml +++ b/Packs/Confluera/Scripts/ConflueraDetectionsSummary/ConflueraDetectionsSummary.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-detections should: - Confluera|||confluera-fetch-detections -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraDetectionsSummaryWarroom/ConflueraDetectionsSummaryWarroom.yml b/Packs/Confluera/Scripts/ConflueraDetectionsSummaryWarroom/ConflueraDetectionsSummaryWarroom.yml index 9014f869015..cc197f31a82 100644 --- a/Packs/Confluera/Scripts/ConflueraDetectionsSummaryWarroom/ConflueraDetectionsSummaryWarroom.yml +++ b/Packs/Confluera/Scripts/ConflueraDetectionsSummaryWarroom/ConflueraDetectionsSummaryWarroom.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-detections should: - Confluera|||confluera-fetch-detections -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraProgressionsCount/ConflueraProgressionsCount.yml b/Packs/Confluera/Scripts/ConflueraProgressionsCount/ConflueraProgressionsCount.yml index 3a77dac3448..201cca0fba4 100644 --- a/Packs/Confluera/Scripts/ConflueraProgressionsCount/ConflueraProgressionsCount.yml +++ b/Packs/Confluera/Scripts/ConflueraProgressionsCount/ConflueraProgressionsCount.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-progressions should: - Confluera|||confluera-fetch-progressions -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraProgressionsData/ConflueraProgressionsData.yml b/Packs/Confluera/Scripts/ConflueraProgressionsData/ConflueraProgressionsData.yml index 2265aecedb1..9964b94d158 100644 --- a/Packs/Confluera/Scripts/ConflueraProgressionsData/ConflueraProgressionsData.yml +++ b/Packs/Confluera/Scripts/ConflueraProgressionsData/ConflueraProgressionsData.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-progressions should: - Confluera|||confluera-fetch-progressions -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/ConflueraProgressionsDataWarroom/ConflueraProgressionsDataWarroom.yml b/Packs/Confluera/Scripts/ConflueraProgressionsDataWarroom/ConflueraProgressionsDataWarroom.yml index 1405d40cfe3..9b5489d086b 100644 --- a/Packs/Confluera/Scripts/ConflueraProgressionsDataWarroom/ConflueraProgressionsDataWarroom.yml +++ b/Packs/Confluera/Scripts/ConflueraProgressionsDataWarroom/ConflueraProgressionsDataWarroom.yml @@ -15,7 +15,7 @@ dependson: - Confluera|||confluera-fetch-progressions should: - Confluera|||confluera-fetch-progressions -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/Scripts/IqHubLog/IqHubLog.yml b/Packs/Confluera/Scripts/IqHubLog/IqHubLog.yml index b37d84ead2e..7f9349390f2 100644 --- a/Packs/Confluera/Scripts/IqHubLog/IqHubLog.yml +++ b/Packs/Confluera/Scripts/IqHubLog/IqHubLog.yml @@ -18,7 +18,7 @@ dependson: should: - Confluera|||confluera-fetch-detections - Confluera|||confluera-fetch-progressions -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/Confluera/pack_metadata.json b/Packs/Confluera/pack_metadata.json index a0c13696106..06561195807 100644 --- a/Packs/Confluera/pack_metadata.json +++ b/Packs/Confluera/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Confluera", "description": "This content pack uses the Confluera integration to fetch detections & progressions from confluera's Iq-Hub portal", "support": "partner", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "confluera", "url": "https://www.confluera.com", "email": "support@confluera.com", diff --git a/Packs/ContentTesting/ReleaseNotes/2_1_5.md b/Packs/ContentTesting/ReleaseNotes/2_1_5.md new file mode 100644 index 00000000000..5d6f46b1ded --- /dev/null +++ b/Packs/ContentTesting/ReleaseNotes/2_1_5.md @@ -0,0 +1,24 @@ + +#### Scripts + +##### UnitTestPlaybookAnalyzer + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChangeHistory + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### UnitTestSaveFieldsList + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ListPlaybookAutomationsCommands + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ContentDependencies + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### UnitTestSaveContextList + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### UnitTestCoverage + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ContentTesting/Scripts/ChangeHistory/ChangeHistory.yml b/Packs/ContentTesting/Scripts/ChangeHistory/ChangeHistory.yml index 113620fc297..81cd78b5d17 100644 --- a/Packs/ContentTesting/Scripts/ChangeHistory/ChangeHistory.yml +++ b/Packs/ContentTesting/Scripts/ChangeHistory/ChangeHistory.yml @@ -4,7 +4,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ChangeHistory comment: "" diff --git a/Packs/ContentTesting/Scripts/ContentDependencies/ContentDependencies.yml b/Packs/ContentTesting/Scripts/ContentDependencies/ContentDependencies.yml index 6116f93137c..ee662823df3 100644 --- a/Packs/ContentTesting/Scripts/ContentDependencies/ContentDependencies.yml +++ b/Packs/ContentTesting/Scripts/ContentDependencies/ContentDependencies.yml @@ -20,7 +20,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ContentDependencies runas: DBotWeakRole diff --git a/Packs/ContentTesting/Scripts/ListPlaybookAutomationsCommands/ListPlaybookAutomationsCommands.yml b/Packs/ContentTesting/Scripts/ListPlaybookAutomationsCommands/ListPlaybookAutomationsCommands.yml index 90a5d454a56..429f5439c45 100644 --- a/Packs/ContentTesting/Scripts/ListPlaybookAutomationsCommands/ListPlaybookAutomationsCommands.yml +++ b/Packs/ContentTesting/Scripts/ListPlaybookAutomationsCommands/ListPlaybookAutomationsCommands.yml @@ -6,7 +6,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ListPlaybookAutomationsCommands runas: DBotWeakRole diff --git a/Packs/ContentTesting/Scripts/UnitTestCoverage/UnitTestCoverage.yml b/Packs/ContentTesting/Scripts/UnitTestCoverage/UnitTestCoverage.yml index d1a542d8012..e6815cec832 100644 --- a/Packs/ContentTesting/Scripts/UnitTestCoverage/UnitTestCoverage.yml +++ b/Packs/ContentTesting/Scripts/UnitTestCoverage/UnitTestCoverage.yml @@ -9,7 +9,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: UnitTestCoverage runas: DBotWeakRole diff --git a/Packs/ContentTesting/Scripts/UnitTestPlaybookAnalyzer/UnitTestPlaybookAnalyzer.yml b/Packs/ContentTesting/Scripts/UnitTestPlaybookAnalyzer/UnitTestPlaybookAnalyzer.yml index d632948ad11..81817a1942a 100644 --- a/Packs/ContentTesting/Scripts/UnitTestPlaybookAnalyzer/UnitTestPlaybookAnalyzer.yml +++ b/Packs/ContentTesting/Scripts/UnitTestPlaybookAnalyzer/UnitTestPlaybookAnalyzer.yml @@ -21,7 +21,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: UnitTestPlaybookAnalyzer runas: DBotWeakRole diff --git a/Packs/ContentTesting/Scripts/UnitTestSaveContextList/UnitTestSaveContextList.yml b/Packs/ContentTesting/Scripts/UnitTestSaveContextList/UnitTestSaveContextList.yml index c4c7d6f6daa..0482627c31a 100644 --- a/Packs/ContentTesting/Scripts/UnitTestSaveContextList/UnitTestSaveContextList.yml +++ b/Packs/ContentTesting/Scripts/UnitTestSaveContextList/UnitTestSaveContextList.yml @@ -8,7 +8,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: UnitTestSaveContextList comment: '' diff --git a/Packs/ContentTesting/Scripts/UnitTestSaveFieldsList/UnitTestSaveFieldsList.yml b/Packs/ContentTesting/Scripts/UnitTestSaveFieldsList/UnitTestSaveFieldsList.yml index 301caf5851e..f5b05cbb42c 100644 --- a/Packs/ContentTesting/Scripts/UnitTestSaveFieldsList/UnitTestSaveFieldsList.yml +++ b/Packs/ContentTesting/Scripts/UnitTestSaveFieldsList/UnitTestSaveFieldsList.yml @@ -9,7 +9,7 @@ contentitemexportablefields: contentitemfields: fromServerVersion: "" comment: '' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: UnitTestSaveFieldsList runas: DBotWeakRole diff --git a/Packs/ContentTesting/pack_metadata.json b/Packs/ContentTesting/pack_metadata.json index ba2682b2aa4..aa80dc487da 100644 --- a/Packs/ContentTesting/pack_metadata.json +++ b/Packs/ContentTesting/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Content Testing", "description": "Supports assessment of upgraded Marketplace content packs against custom content and enables content testing within XSOAR. Dynamically select and test automations, playbooks, and sub-playbooks as required prior to push to production. Create a \"UnitTesting\" incident type and review the \"Help\" tab in the layout for description of the tools available and the examples using the testing tools.", "support": "community", - "currentVersion": "2.1.4", + "currentVersion": "2.1.5", "author": "rurhrlaub", "url": "", "email": "", diff --git a/Packs/CortexAttackSurfaceManagement/Integrations/CortexAttackSurfaceManagement/CortexAttackSurfaceManagement.yml b/Packs/CortexAttackSurfaceManagement/Integrations/CortexAttackSurfaceManagement/CortexAttackSurfaceManagement.yml index d23fd6865cc..566bae2aee6 100644 --- a/Packs/CortexAttackSurfaceManagement/Integrations/CortexAttackSurfaceManagement/CortexAttackSurfaceManagement.yml +++ b/Packs/CortexAttackSurfaceManagement/Integrations/CortexAttackSurfaceManagement/CortexAttackSurfaceManagement.yml @@ -468,7 +468,7 @@ script: description: Attack surface rule priority. - contextPath: ASM.AttackSurfaceRule.remediation_guidance description: Remediation guidance of attack surface rule. - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_60.md b/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_60.md new file mode 100644 index 00000000000..2ea4f137c00 --- /dev/null +++ b/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_60.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cortex Attack Surface Management + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CortexAttackSurfaceManagement/pack_metadata.json b/Packs/CortexAttackSurfaceManagement/pack_metadata.json index 3b12a936e21..95e204b9da3 100644 --- a/Packs/CortexAttackSurfaceManagement/pack_metadata.json +++ b/Packs/CortexAttackSurfaceManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cortex Attack Surface Management", "description": "Content for working with Attack Surface Management (ASM).", "support": "xsoar", - "currentVersion": "1.7.59", + "currentVersion": "1.7.60", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CounterCraft/Integrations/CounterCraft/CounterCraft.yml b/Packs/CounterCraft/Integrations/CounterCraft/CounterCraft.yml index b14b0ce2613..7a372e4b475 100644 --- a/Packs/CounterCraft/Integrations/CounterCraft/CounterCraft.yml +++ b/Packs/CounterCraft/Integrations/CounterCraft/CounterCraft.yml @@ -440,7 +440,7 @@ script: description: Breadcrumb ID. type: number description: Manage breadcrumb. - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/CounterCraft/ReleaseNotes/1_0_21.md b/Packs/CounterCraft/ReleaseNotes/1_0_21.md new file mode 100644 index 00000000000..9771074e7d1 --- /dev/null +++ b/Packs/CounterCraft/ReleaseNotes/1_0_21.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CounterCraft Deception Director + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CounterCraft/pack_metadata.json b/Packs/CounterCraft/pack_metadata.json index 68ea5019f4e..909026d2848 100644 --- a/Packs/CounterCraft/pack_metadata.json +++ b/Packs/CounterCraft/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CounterCraft Deception Director", "description": "CounterCraft Deception Solution detects advanced adversaries. Automate counterintelligence campaigns to discover targeted attacks with real-time active response.", "support": "partner", - "currentVersion": "1.0.20", + "currentVersion": "1.0.21", "author": "Counter Craft", "url": "", "email": "support@countercraft.zendesk.com", diff --git a/Packs/CovalenceManagedSecurity/Integrations/CovalenceManagedSecurity/CovalenceManagedSecurity.yml b/Packs/CovalenceManagedSecurity/Integrations/CovalenceManagedSecurity/CovalenceManagedSecurity.yml index 328be009c7c..d0b5372cf00 100644 --- a/Packs/CovalenceManagedSecurity/Integrations/CovalenceManagedSecurity/CovalenceManagedSecurity.yml +++ b/Packs/CovalenceManagedSecurity/Integrations/CovalenceManagedSecurity/CovalenceManagedSecurity.yml @@ -503,7 +503,7 @@ script: - contextPath: FESBroker.result description: Result. type: String - dockerimage: demisto/python3:3.10.13.89009 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '' diff --git a/Packs/CovalenceManagedSecurity/ReleaseNotes/1_3_1.md b/Packs/CovalenceManagedSecurity/ReleaseNotes/1_3_1.md new file mode 100644 index 00000000000..485c8a156fa --- /dev/null +++ b/Packs/CovalenceManagedSecurity/ReleaseNotes/1_3_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Covalence Managed Security + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CovalenceManagedSecurity/pack_metadata.json b/Packs/CovalenceManagedSecurity/pack_metadata.json index a2be7cd6648..e56bbed6eb7 100644 --- a/Packs/CovalenceManagedSecurity/pack_metadata.json +++ b/Packs/CovalenceManagedSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Covalence Managed Security", "description": "Triggers by triaged alerts from endpoint, cloud, and network security monitoring. Contains event details and easy-to-follow mitigation steps.", "support": "partner", - "currentVersion": "1.3.0", + "currentVersion": "1.3.1", "author": "Field Effect Security", "url": "https://fieldeffect.com/products/covalence-cyber-security/", "email": "support@fieldeffect.com", diff --git a/Packs/CrowdSec/Integrations/CrowdSec/CrowdSec.yml b/Packs/CrowdSec/Integrations/CrowdSec/CrowdSec.yml index b31fb3ba5de..7ebfdffc827 100644 --- a/Packs/CrowdSec/Integrations/CrowdSec/CrowdSec.yml +++ b/Packs/CrowdSec/Integrations/CrowdSec/CrowdSec.yml @@ -182,7 +182,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - No tests (auto formatted) diff --git a/Packs/CrowdSec/ReleaseNotes/1_0_5.md b/Packs/CrowdSec/ReleaseNotes/1_0_5.md new file mode 100644 index 00000000000..49b7c0363a8 --- /dev/null +++ b/Packs/CrowdSec/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CrowdSec + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CrowdSec/pack_metadata.json b/Packs/CrowdSec/pack_metadata.json index ca7c4b3f7c9..c31f28f3b22 100644 --- a/Packs/CrowdSec/pack_metadata.json +++ b/Packs/CrowdSec/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdSec", "description": "Enrich the data you have on your threats with the most advanced real-world CTI.", "support": "partner", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "CrowdSec", "url": "https://www.crowdsec.net/contact-crowdsec", "email": "support@crowdsec.net", diff --git a/Packs/Cryptosim/Integrations/Cryptosim/Cryptosim.yml b/Packs/Cryptosim/Integrations/Cryptosim/Cryptosim.yml index a2b42a95c88..a7756a52db5 100644 --- a/Packs/Cryptosim/Integrations/Cryptosim/Cryptosim.yml +++ b/Packs/Cryptosim/Integrations/Cryptosim/Cryptosim.yml @@ -106,7 +106,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 tests: - No tests (auto formatted) diff --git a/Packs/Cryptosim/ReleaseNotes/1_0_7.md b/Packs/Cryptosim/ReleaseNotes/1_0_7.md new file mode 100644 index 00000000000..370fb2f86bd --- /dev/null +++ b/Packs/Cryptosim/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cryptosim + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Cryptosim/pack_metadata.json b/Packs/Cryptosim/pack_metadata.json index 1be84fd076e..23c0c5a4cc3 100644 --- a/Packs/Cryptosim/pack_metadata.json +++ b/Packs/Cryptosim/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cryptosim", "description": "CRYPTOSIM meets the SIEM needs of corporations by its unique correlation engine works, capable of hierarchical correlation.", "support": "partner", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "itemPrefix": [ "CRYPTOSIM" ], diff --git a/Packs/CyCognito/ReleaseNotes/1_0_25.md b/Packs/CyCognito/ReleaseNotes/1_0_25.md new file mode 100644 index 00000000000..ac1f37aaf5c --- /dev/null +++ b/Packs/CyCognito/ReleaseNotes/1_0_25.md @@ -0,0 +1,7 @@ + +#### Scripts + +##### CyCognitoGetEndpoints +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/CyCognito/Scripts/CyCognitoGetEndpoints/CyCognitoGetEndpoints.yml b/Packs/CyCognito/Scripts/CyCognitoGetEndpoints/CyCognitoGetEndpoints.yml index b671496c9ac..1a22c54c59c 100644 --- a/Packs/CyCognito/Scripts/CyCognitoGetEndpoints/CyCognitoGetEndpoints.yml +++ b/Packs/CyCognito/Scripts/CyCognitoGetEndpoints/CyCognitoGetEndpoints.yml @@ -11,7 +11,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/CyCognito/pack_metadata.json b/Packs/CyCognito/pack_metadata.json index 20be99f2851..a149e19fc9a 100644 --- a/Packs/CyCognito/pack_metadata.json +++ b/Packs/CyCognito/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CyCognito", "description": "Fetches the issues associated with a particular asset from the CyCognito platform.", "support": "partner", - "currentVersion": "1.0.24", + "currentVersion": "1.0.25", "author": "CyCognito", "url": "", "email": "support@cycognito.com", diff --git a/Packs/CyberArkPAS/Integrations/CyberArkPAS/CyberArkPAS.yml b/Packs/CyberArkPAS/Integrations/CyberArkPAS/CyberArkPAS.yml index 09ca5a84231..c4d12fa1ee4 100644 --- a/Packs/CyberArkPAS/Integrations/CyberArkPAS/CyberArkPAS.yml +++ b/Packs/CyberArkPAS/Integrations/CyberArkPAS/CyberArkPAS.yml @@ -932,7 +932,7 @@ script: - contextPath: CyberArkPAS.SecurityEvents.type description: The type of the security events. type: String - dockerimage: demisto/python3:3.10.13.77674 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/CyberArkPAS/ReleaseNotes/1_0_16.md b/Packs/CyberArkPAS/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..0186d309486 --- /dev/null +++ b/Packs/CyberArkPAS/ReleaseNotes/1_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CyberArk PAS + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CyberArkPAS/pack_metadata.json b/Packs/CyberArkPAS/pack_metadata.json index 42d8c2ccd7f..288f5631ea4 100644 --- a/Packs/CyberArkPAS/pack_metadata.json +++ b/Packs/CyberArkPAS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CyberArk", "description": "Provides a Safe Haven, where all your administrative passwords can be securely archived, transferred and shared by authorized users.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "CyberArk", "url": "https://www.cyberark.com/services-support/technical-support-contact/", "email": "support@cyberark.com", diff --git a/Packs/Cybereason/Integrations/Cybereason/Cybereason.yml b/Packs/Cybereason/Integrations/Cybereason/Cybereason.yml index 0c4d93eb92f..4fbd11cca7b 100644 --- a/Packs/Cybereason/Integrations/Cybereason/Cybereason.yml +++ b/Packs/Cybereason/Integrations/Cybereason/Cybereason.yml @@ -837,7 +837,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.89009 + dockerimage: demisto/python3:3.11.10.115186 tests: - Cybereason Test fromversion: 5.0.0 diff --git a/Packs/Cybereason/ReleaseNotes/2_1_18.md b/Packs/Cybereason/ReleaseNotes/2_1_18.md new file mode 100644 index 00000000000..045d10a5bb4 --- /dev/null +++ b/Packs/Cybereason/ReleaseNotes/2_1_18.md @@ -0,0 +1,14 @@ + +#### Integrations + +##### Cybereason +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +#### Scripts + +##### CybereasonPreProcessingExample +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Cybereason/Scripts/CybereasonPreProcessingExample/CybereasonPreProcessingExample.yml b/Packs/Cybereason/Scripts/CybereasonPreProcessingExample/CybereasonPreProcessingExample.yml index aedc0546fa3..cf7df94d797 100644 --- a/Packs/Cybereason/Scripts/CybereasonPreProcessingExample/CybereasonPreProcessingExample.yml +++ b/Packs/Cybereason/Scripts/CybereasonPreProcessingExample/CybereasonPreProcessingExample.yml @@ -19,4 +19,4 @@ runas: DBotWeakRole tests: - Cybereason Pre Processing Test fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.89009 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/Cybereason/pack_metadata.json b/Packs/Cybereason/pack_metadata.json index 1890c0d2c7b..810a89ffba6 100644 --- a/Packs/Cybereason/pack_metadata.json +++ b/Packs/Cybereason/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cybereason", "description": "Endpoint detection and response to manage and query malops, connections and processes.", "support": "partner", - "currentVersion": "2.1.17", + "currentVersion": "2.1.18", "author": "Cybereason", "url": "https://nest.cybereason.com/", "email": "support@cybereason.com", diff --git a/Packs/Cyberint/Integrations/Cyberint/Cyberint.yml b/Packs/Cyberint/Integrations/Cyberint/Cyberint.yml index 0c28b65a802..f7a9f105326 100644 --- a/Packs/Cyberint/Integrations/Cyberint/Cyberint.yml +++ b/Packs/Cyberint/Integrations/Cyberint/Cyberint.yml @@ -553,7 +553,7 @@ script: name: lastUpdate description: Gets the list of incidents that were modified since the last update time. Note that this method is here for debugging purposes. The get-modified-remote-data command is used as part of a Mirroring feature, which is available in Cortex XSOAR from version 6.1. name: get-modified-remote-data - dockerimage: demisto/python3:3.10.13.82076 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Cyberint/ReleaseNotes/1_1_4.md b/Packs/Cyberint/ReleaseNotes/1_1_4.md new file mode 100644 index 00000000000..021d068073c --- /dev/null +++ b/Packs/Cyberint/ReleaseNotes/1_1_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cyberint + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Cyberint/pack_metadata.json b/Packs/Cyberint/pack_metadata.json index b1f309a37d4..1b85afed028 100644 --- a/Packs/Cyberint/pack_metadata.json +++ b/Packs/Cyberint/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cyberint", "description": "Cyberint provides intelligence-driven digital risk protection. This integration will help your enterprise effectively consume actionable cyber alerts to increase your security posture.", "support": "partner", - "currentVersion": "1.1.3", + "currentVersion": "1.1.4", "author": "Cyberint", "url": "https://cyberint.com", "email": "support@cyberint.com", diff --git a/Packs/Cymptom/Integrations/Cymptom/Cymptom.yml b/Packs/Cymptom/Integrations/Cymptom/Cymptom.yml index 18035045ba0..3717a2fab0c 100644 --- a/Packs/Cymptom/Integrations/Cymptom/Cymptom.yml +++ b/Packs/Cymptom/Integrations/Cymptom/Cymptom.yml @@ -89,7 +89,7 @@ script: - contextPath: Cymptom.CrackedUsers.Username description: Username of users with cracked passwords type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Cymptom/ReleaseNotes/1_0_12.md b/Packs/Cymptom/ReleaseNotes/1_0_12.md new file mode 100644 index 00000000000..5627677c657 --- /dev/null +++ b/Packs/Cymptom/ReleaseNotes/1_0_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cymptom + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Cymptom/pack_metadata.json b/Packs/Cymptom/pack_metadata.json index f54e4a37b9b..cea9ff90f67 100644 --- a/Packs/Cymptom/pack_metadata.json +++ b/Packs/Cymptom/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cymptom", "description": "Cymptom is a Breach and Attack Simulation solution that revolutionizes\n the existing approach by transforming attack simulation into a data analysis question.\n Cymptom agentless scanning brings real-time always-on visibility into the entire\n security posture.", "support": "partner", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Cymptom", "url": "https://cymptom.com/", "email": "support@Cymptom.com", diff --git a/Packs/Cymulate/Integrations/Cymulate_v2/Cymulate_v2.yml b/Packs/Cymulate/Integrations/Cymulate_v2/Cymulate_v2.yml index 72f636c0077..03b951efa92 100644 --- a/Packs/Cymulate/Integrations/Cymulate_v2/Cymulate_v2.yml +++ b/Packs/Cymulate/Integrations/Cymulate_v2/Cymulate_v2.yml @@ -661,7 +661,7 @@ script: - contextPath: Cymulate.Simulations.Template description: Attack template. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Cymulate/ReleaseNotes/2_0_28.md b/Packs/Cymulate/ReleaseNotes/2_0_28.md new file mode 100644 index 00000000000..166dcde54ff --- /dev/null +++ b/Packs/Cymulate/ReleaseNotes/2_0_28.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cymulate v2 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Cymulate/pack_metadata.json b/Packs/Cymulate/pack_metadata.json index 4e97a5f8be1..09788799ef0 100644 --- a/Packs/Cymulate/pack_metadata.json +++ b/Packs/Cymulate/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cymulate", "description": "You can now verify your security posture on-demand using the Cymulate integration, which allows you to launch simulations of cyberattacks, breach, and attacks against yourself", "support": "partner", - "currentVersion": "2.0.27", + "currentVersion": "2.0.28", "author": "Cymulate", "url": "", "email": "support@cymulate.com", diff --git a/Packs/CyrenInboxSecurity/Integrations/CyrenInboxSecurity/CyrenInboxSecurity.yml b/Packs/CyrenInboxSecurity/Integrations/CyrenInboxSecurity/CyrenInboxSecurity.yml index 751f941522e..b23800daaf8 100644 --- a/Packs/CyrenInboxSecurity/Integrations/CyrenInboxSecurity/CyrenInboxSecurity.yml +++ b/Packs/CyrenInboxSecurity/Integrations/CyrenInboxSecurity/CyrenInboxSecurity.yml @@ -83,7 +83,7 @@ script: - contextPath: Cyren.data.status description: status of actions performed type: string - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/CyrenInboxSecurity/ReleaseNotes/1_1_14.md b/Packs/CyrenInboxSecurity/ReleaseNotes/1_1_14.md new file mode 100644 index 00000000000..6594afe3a94 --- /dev/null +++ b/Packs/CyrenInboxSecurity/ReleaseNotes/1_1_14.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Cyren Inbox Security + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### Cyren-Show-Threat-Indicators + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Cyren-Find-Similar-Incidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/CyrenInboxSecurity/Scripts/CyrenFindSimilarIncidents/CyrenFindSimilarIncidents.yml b/Packs/CyrenInboxSecurity/Scripts/CyrenFindSimilarIncidents/CyrenFindSimilarIncidents.yml index 4ee9ecf2cd2..dea08699d61 100644 --- a/Packs/CyrenInboxSecurity/Scripts/CyrenFindSimilarIncidents/CyrenFindSimilarIncidents.yml +++ b/Packs/CyrenInboxSecurity/Scripts/CyrenFindSimilarIncidents/CyrenFindSimilarIncidents.yml @@ -10,7 +10,7 @@ comment: |- commonfields: id: Cyren-Find-Similar-Incidents version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: Cyren-Find-Similar-Incidents outputs: diff --git a/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml b/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml index be1c897fb54..5104099cdc8 100644 --- a/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml +++ b/Packs/CyrenInboxSecurity/Scripts/CyrenShowThreatIndicators/CyrenShowThreatIndicators.yml @@ -7,7 +7,7 @@ comment: |- commonfields: id: Cyren-Show-Threat-Indicators version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: Cyren-Show-Threat-Indicators script: '' diff --git a/Packs/CyrenInboxSecurity/pack_metadata.json b/Packs/CyrenInboxSecurity/pack_metadata.json index 00ced76ba11..11478027f24 100644 --- a/Packs/CyrenInboxSecurity/pack_metadata.json +++ b/Packs/CyrenInboxSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cyren Inbox Security", "description": "Cyren Inbox Security protects Office 365 mailboxes from evasive phishing, business email compromise, and fraud.", "support": "partner", - "currentVersion": "1.1.13", + "currentVersion": "1.1.14", "author": "Cyren", "url": "https://www.cyren.com/products/cyren-inbox-security", "email": "paltoalto-cortex-xsoar@cyren.com", diff --git a/Packs/DarktraceASM/Integrations/DarktraceASMRisk/DarktraceASMRisk.yml b/Packs/DarktraceASM/Integrations/DarktraceASMRisk/DarktraceASMRisk.yml index 043a5e2af08..e849321cb60 100644 --- a/Packs/DarktraceASM/Integrations/DarktraceASMRisk/DarktraceASMRisk.yml +++ b/Packs/DarktraceASM/Integrations/DarktraceASMRisk/DarktraceASMRisk.yml @@ -295,7 +295,7 @@ script: description: All tags assigned to asset. description: Unassign an existing tag to a Darktrace ASM Asset within the Darktrace UI. - dockerimage: demisto/python3:3.10.14.95663 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false subtype: python3 \ No newline at end of file diff --git a/Packs/DarktraceASM/ReleaseNotes/1_0_2.md b/Packs/DarktraceASM/ReleaseNotes/1_0_2.md new file mode 100644 index 00000000000..3ba8e2bfc0c --- /dev/null +++ b/Packs/DarktraceASM/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Darktrace ASM + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DarktraceASM/pack_metadata.json b/Packs/DarktraceASM/pack_metadata.json index 26b987530b3..09e2af4892b 100644 --- a/Packs/DarktraceASM/pack_metadata.json +++ b/Packs/DarktraceASM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DarktraceASM", "description": "Populates Darktrace ASM Risks in Cortex XSOAR, allowing for cross-platform automated investigation and response.", "support": "partner", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "fromVersion": "6.6.0", "author": "Darktrace", "githubUser": "", @@ -29,4 +29,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/DataminrPulse/Integrations/DataminrPulse/DataminrPulse.yml b/Packs/DataminrPulse/Integrations/DataminrPulse/DataminrPulse.yml index 135d4e312e8..8c054873eaf 100644 --- a/Packs/DataminrPulse/Integrations/DataminrPulse/DataminrPulse.yml +++ b/Packs/DataminrPulse/Integrations/DataminrPulse/DataminrPulse.yml @@ -709,7 +709,7 @@ script: - contextPath: DataminrPulse.Alerts.userTopHashtags description: User's top hashtags. type: Unknown - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/DataminrPulse/ReleaseNotes/1_0_12.md b/Packs/DataminrPulse/ReleaseNotes/1_0_12.md new file mode 100644 index 00000000000..0bfc9464803 --- /dev/null +++ b/Packs/DataminrPulse/ReleaseNotes/1_0_12.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Dataminr Pulse + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### DataminrPulseTransformExtractedIndicatorsToList + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### DataminrPulseDisplayRelatedAlerts + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DataminrPulse/Scripts/DataminrPulseDisplayRelatedAlerts/DataminrPulseDisplayRelatedAlerts.yml b/Packs/DataminrPulse/Scripts/DataminrPulseDisplayRelatedAlerts/DataminrPulseDisplayRelatedAlerts.yml index 30c3afa8b6e..d90e2a0eee7 100644 --- a/Packs/DataminrPulse/Scripts/DataminrPulseDisplayRelatedAlerts/DataminrPulseDisplayRelatedAlerts.yml +++ b/Packs/DataminrPulse/Scripts/DataminrPulseDisplayRelatedAlerts/DataminrPulseDisplayRelatedAlerts.yml @@ -14,7 +14,7 @@ dependson: must: - Dataminr Pulse|||dataminrpulse-related-alerts-get - '|||dataminrpulse-related-alerts-get' -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/DataminrPulse/Scripts/DataminrPulseTransformExtractedIndicatorsToList/DataminrPulseTransformExtractedIndicatorsToList.yml b/Packs/DataminrPulse/Scripts/DataminrPulseTransformExtractedIndicatorsToList/DataminrPulseTransformExtractedIndicatorsToList.yml index 4333d19149a..6404551aa9d 100644 --- a/Packs/DataminrPulse/Scripts/DataminrPulseTransformExtractedIndicatorsToList/DataminrPulseTransformExtractedIndicatorsToList.yml +++ b/Packs/DataminrPulse/Scripts/DataminrPulseTransformExtractedIndicatorsToList/DataminrPulseTransformExtractedIndicatorsToList.yml @@ -14,7 +14,7 @@ outputs: type: Unknown script: '-' subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 timeout: '0' type: python tests: diff --git a/Packs/DataminrPulse/pack_metadata.json b/Packs/DataminrPulse/pack_metadata.json index 71048910591..5ec42529ad3 100644 --- a/Packs/DataminrPulse/pack_metadata.json +++ b/Packs/DataminrPulse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Dataminr Pulse", "description": "Dataminr Pulse's AI-powered, real-time intelligence integrates into Cortex XSOAR workflows for faster detection and response.", "support": "partner", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Dataminr", "url": "https://www.dataminr.com/dataminr-support#support", "categories": [ diff --git a/Packs/DeCYFIR/Integrations/decyfir/decyfir.yml b/Packs/DeCYFIR/Integrations/decyfir/decyfir.yml index b2345873e8d..56438ead31b 100644 --- a/Packs/DeCYFIR/Integrations/decyfir/decyfir.yml +++ b/Packs/DeCYFIR/Integrations/decyfir/decyfir.yml @@ -53,7 +53,7 @@ display: DeCYFIR name: decyfir script: commands: [] - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 feed: false isfetch: true runonce: false diff --git a/Packs/DeCYFIR/ReleaseNotes/1_0_14.md b/Packs/DeCYFIR/ReleaseNotes/1_0_14.md new file mode 100644 index 00000000000..f1a9e60d9b2 --- /dev/null +++ b/Packs/DeCYFIR/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DeCYFIR + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DeCYFIR/pack_metadata.json b/Packs/DeCYFIR/pack_metadata.json index 30d9021cb1f..e8627b32abf 100644 --- a/Packs/DeCYFIR/pack_metadata.json +++ b/Packs/DeCYFIR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DeCYFIR", "description": "DeCYFIR API's provides External Threat Landscape Management insights", "support": "partner", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Cyfirma", "url": "https://www.cyfirma.com/", "email": "contact@cyfirma.com", diff --git a/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml b/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml index 00b347d0d96..91b2f8bc956 100644 --- a/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml +++ b/Packs/DeepInstinct/Integrations/DeepInstinct/DeepInstinct.yml @@ -309,7 +309,7 @@ script: description: comma separeted list of event ids. isArray: true description: close list of events. - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '-' type: python diff --git a/Packs/DeepInstinct/Integrations/DeepInstinct3x/DeepInstinct3x.yml b/Packs/DeepInstinct/Integrations/DeepInstinct3x/DeepInstinct3x.yml index 5d404cd2312..e25e3c6e732 100644 --- a/Packs/DeepInstinct/Integrations/DeepInstinct3x/DeepInstinct3x.yml +++ b/Packs/DeepInstinct/Integrations/DeepInstinct3x/DeepInstinct3x.yml @@ -470,7 +470,7 @@ script: required: true description: Remove agent from device at next check-in. name: deepinstinctv3-remove-device - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '-' type: python diff --git a/Packs/DeepInstinct/ReleaseNotes/1_1_19.md b/Packs/DeepInstinct/ReleaseNotes/1_1_19.md new file mode 100644 index 00000000000..853df99c23f --- /dev/null +++ b/Packs/DeepInstinct/ReleaseNotes/1_1_19.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### DeepInstinct v3 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Deep Instinct + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DeepInstinct/pack_metadata.json b/Packs/DeepInstinct/pack_metadata.json index 263fe190f46..f62e699d299 100644 --- a/Packs/DeepInstinct/pack_metadata.json +++ b/Packs/DeepInstinct/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DeepInstinct", "description": "At Deep Instinct, we prevent what others can't find.", "support": "partner", - "currentVersion": "1.1.18", + "currentVersion": "1.1.19", "author": "Deep Instinct", "url": "", "email": "support@deepinstinct.com", diff --git a/Packs/DelineaDSV/Integrations/DelineaDSV/DelineaDSV.yml b/Packs/DelineaDSV/Integrations/DelineaDSV/DelineaDSV.yml index f08cdca49e7..1645ea73acb 100644 --- a/Packs/DelineaDSV/Integrations/DelineaDSV/DelineaDSV.yml +++ b/Packs/DelineaDSV/Integrations/DelineaDSV/DelineaDSV.yml @@ -38,7 +38,7 @@ script: - contextPath: secret description: Received JSON object secret. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/DelineaDSV/ReleaseNotes/1_0_6.md b/Packs/DelineaDSV/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..1e9c5ebdfb4 --- /dev/null +++ b/Packs/DelineaDSV/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DelineaDSV + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DelineaDSV/pack_metadata.json b/Packs/DelineaDSV/pack_metadata.json index 386d0221ffc..99132f484ed 100644 --- a/Packs/DelineaDSV/pack_metadata.json +++ b/Packs/DelineaDSV/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Delinea DevOps Secrets Vault", "description": "This integration pack helps you retrieve the data stored in the Delinea DevOps Storage Vault and use it in other integrations.", "support": "partner", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Delinea Inc", "url": "https://delinea.com/support", "email": "support@delinea.com", diff --git a/Packs/DelineaSS/Integrations/DelineaSS/DelineaSS.yml b/Packs/DelineaSS/Integrations/DelineaSS/DelineaSS.yml index 42cf9669a66..e16f9b9e6b5 100644 --- a/Packs/DelineaSS/Integrations/DelineaSS/DelineaSS.yml +++ b/Packs/DelineaSS/Integrations/DelineaSS/DelineaSS.yml @@ -615,7 +615,7 @@ script: - contextPath: Delinea.Secret.ChangePassword description: Secret summary. type: String - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/DelineaSS/ReleaseNotes/3_0_22.md b/Packs/DelineaSS/ReleaseNotes/3_0_22.md new file mode 100644 index 00000000000..cda0dba2339 --- /dev/null +++ b/Packs/DelineaSS/ReleaseNotes/3_0_22.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DelineaSS + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DelineaSS/pack_metadata.json b/Packs/DelineaSS/pack_metadata.json index 8b2fd02c257..fd1e434c618 100644 --- a/Packs/DelineaSS/pack_metadata.json +++ b/Packs/DelineaSS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Delinea Secret Server", "description": "Secure privileges for service, application, root and administrator accounts across your enterprise.", "support": "partner", - "currentVersion": "3.0.21", + "currentVersion": "3.0.22", "author": "Delinea, Inc", "url": "https://delinea.com/support", "email": "support@delinea.com", diff --git a/Packs/DeveloperTools/Integrations/CreateIncidents/CreateIncidents.yml b/Packs/DeveloperTools/Integrations/CreateIncidents/CreateIncidents.yml index ceeec5a2e55..d38af83a4a2 100644 --- a/Packs/DeveloperTools/Integrations/CreateIncidents/CreateIncidents.yml +++ b/Packs/DeveloperTools/Integrations/CreateIncidents/CreateIncidents.yml @@ -66,7 +66,7 @@ script: name: attachment_paths description: Creates incidents from json file, and stores it in the instance context. name: create-test-incident-from-raw-json - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/DeveloperTools/ReleaseNotes/1_3_24.md b/Packs/DeveloperTools/ReleaseNotes/1_3_24.md new file mode 100644 index 00000000000..13c683605a1 --- /dev/null +++ b/Packs/DeveloperTools/ReleaseNotes/1_3_24.md @@ -0,0 +1,22 @@ + +#### Integrations + +##### Create Test Incidents +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +#### Scripts + +##### GetServerInfo +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### VerifyIntegrationHealth +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### WaitAndCompleteTask +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/DeveloperTools/Scripts/GetServerInfo/GetServerInfo.yml b/Packs/DeveloperTools/Scripts/GetServerInfo/GetServerInfo.yml index 48242db43b0..24563db723e 100644 --- a/Packs/DeveloperTools/Scripts/GetServerInfo/GetServerInfo.yml +++ b/Packs/DeveloperTools/Scripts/GetServerInfo/GetServerInfo.yml @@ -13,7 +13,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.14.92207 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.9.0 tests: - No test diff --git a/Packs/DeveloperTools/Scripts/VerifyIntegrationHealth/VerifyIntegrationHealth.yml b/Packs/DeveloperTools/Scripts/VerifyIntegrationHealth/VerifyIntegrationHealth.yml index 534a0cf66ee..4827966b96d 100644 --- a/Packs/DeveloperTools/Scripts/VerifyIntegrationHealth/VerifyIntegrationHealth.yml +++ b/Packs/DeveloperTools/Scripts/VerifyIntegrationHealth/VerifyIntegrationHealth.yml @@ -23,7 +23,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No test diff --git a/Packs/DeveloperTools/Scripts/WaitAndCompleteTask/WaitAndCompleteTask.yml b/Packs/DeveloperTools/Scripts/WaitAndCompleteTask/WaitAndCompleteTask.yml index dcbf7cab634..27b72853a11 100644 --- a/Packs/DeveloperTools/Scripts/WaitAndCompleteTask/WaitAndCompleteTask.yml +++ b/Packs/DeveloperTools/Scripts/WaitAndCompleteTask/WaitAndCompleteTask.yml @@ -48,7 +48,7 @@ tags: timeout: 2400 type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.1.0 tests: - No tests (auto formatted) diff --git a/Packs/DeveloperTools/pack_metadata.json b/Packs/DeveloperTools/pack_metadata.json index aa12b358abb..bdf5cc70956 100644 --- a/Packs/DeveloperTools/pack_metadata.json +++ b/Packs/DeveloperTools/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Developer Tools", "description": "Basic tools for content development.", "support": "community", - "currentVersion": "1.3.23", + "currentVersion": "1.3.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/DigitalGuardian/Integrations/DigitalGuardian/DigitalGuardian.yml b/Packs/DigitalGuardian/Integrations/DigitalGuardian/DigitalGuardian.yml index f95cae475df..a392de43485 100644 --- a/Packs/DigitalGuardian/Integrations/DigitalGuardian/DigitalGuardian.yml +++ b/Packs/DigitalGuardian/Integrations/DigitalGuardian/DigitalGuardian.yml @@ -119,7 +119,7 @@ script: required: true description: Remove Componentlist Entry. name: digitalguardian-remove-componentlist-entry - dockerimage: demisto/python3:3.10.14.98471 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml b/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml index efb87eed194..3d1dd29163d 100644 --- a/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml +++ b/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml @@ -70,7 +70,7 @@ script: description: Gets events from Hello World. execution: false name: digital-guardian-get-events - dockerimage: demisto/python3:3.10.14.98471 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true runonce: false script: '-' diff --git a/Packs/DigitalGuardian/ReleaseNotes/1_1_6.md b/Packs/DigitalGuardian/ReleaseNotes/1_1_6.md new file mode 100644 index 00000000000..0deab977a95 --- /dev/null +++ b/Packs/DigitalGuardian/ReleaseNotes/1_1_6.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Digital Guardian + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Digital Guardian ARC Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DigitalGuardian/pack_metadata.json b/Packs/DigitalGuardian/pack_metadata.json index 879699b60a0..a133a5a0d65 100644 --- a/Packs/DigitalGuardian/pack_metadata.json +++ b/Packs/DigitalGuardian/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Digital Guardian", "description": "Digital Guardian ARC Watchlist Integration", "support": "partner", - "currentVersion": "1.1.5", + "currentVersion": "1.1.6", "author": "Digital Guardian", "url": "https://digitalguardian.com", "email": "support@digitalguardian.com", diff --git a/Packs/DigitalShadows/Integrations/ReliaQuestGreyMatterDRPEventCollector/ReliaQuestGreyMatterDRPEventCollector.yml b/Packs/DigitalShadows/Integrations/ReliaQuestGreyMatterDRPEventCollector/ReliaQuestGreyMatterDRPEventCollector.yml index f59e7e35c8d..0930af0f9da 100644 --- a/Packs/DigitalShadows/Integrations/ReliaQuestGreyMatterDRPEventCollector/ReliaQuestGreyMatterDRPEventCollector.yml +++ b/Packs/DigitalShadows/Integrations/ReliaQuestGreyMatterDRPEventCollector/ReliaQuestGreyMatterDRPEventCollector.yml @@ -66,7 +66,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true fromversion: 8.0.0 supportlevelheader: xsoar diff --git a/Packs/DigitalShadows/ReleaseNotes/2_0_3.md b/Packs/DigitalShadows/ReleaseNotes/2_0_3.md new file mode 100644 index 00000000000..1ba380682c4 --- /dev/null +++ b/Packs/DigitalShadows/ReleaseNotes/2_0_3.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### ReliaQuest GreyMatter DRP Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### DsSearchQueryArray + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DigitalShadows/Scripts/DsSearchQueryArray/DsSearchQueryArray.yml b/Packs/DigitalShadows/Scripts/DsSearchQueryArray/DsSearchQueryArray.yml index bdfb31f4f89..0eba104bb00 100644 --- a/Packs/DigitalShadows/Scripts/DsSearchQueryArray/DsSearchQueryArray.yml +++ b/Packs/DigitalShadows/Scripts/DsSearchQueryArray/DsSearchQueryArray.yml @@ -32,7 +32,7 @@ args: isArray: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/DigitalShadows/pack_metadata.json b/Packs/DigitalShadows/pack_metadata.json index 335e01f1b7a..0086a30d9e9 100644 --- a/Packs/DigitalShadows/pack_metadata.json +++ b/Packs/DigitalShadows/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ReliaQuest GreyMatter DRP Incidents", "description": "ReliaQuest GreyMatter DRP monitors and manages an organization's digital risk across the open, deep, and dark web.", "support": "partner", - "currentVersion": "2.0.2", + "currentVersion": "2.0.3", "author": "ReliaQuest", "url": "https:// www.reliaquest.com/", "email": "drpsupport@reliaquest.com", diff --git a/Packs/DomainToolsIrisDetect/Integrations/DomainToolsIrisDetect/DomainToolsIrisDetect.yml b/Packs/DomainToolsIrisDetect/Integrations/DomainToolsIrisDetect/DomainToolsIrisDetect.yml index fac966d9cb8..9852b6a1af8 100644 --- a/Packs/DomainToolsIrisDetect/Integrations/DomainToolsIrisDetect/DomainToolsIrisDetect.yml +++ b/Packs/DomainToolsIrisDetect/Integrations/DomainToolsIrisDetect/DomainToolsIrisDetect.yml @@ -1044,7 +1044,7 @@ script: type: String - description: This command will reset your fetch history. name: domaintools-iris-detect-reset-fetch-indicators - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/DomainToolsIrisDetect/ReleaseNotes/1_0_15.md b/Packs/DomainToolsIrisDetect/ReleaseNotes/1_0_15.md new file mode 100644 index 00000000000..a34358ff3b0 --- /dev/null +++ b/Packs/DomainToolsIrisDetect/ReleaseNotes/1_0_15.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### DomainTools Iris Detect + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### DomainToolsIrisDetectStatusUpdate + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/DomainToolsIrisDetect/Scripts/DomainToolsIrisDetectStatusUpdate/DomainToolsIrisDetectStatusUpdate.yml b/Packs/DomainToolsIrisDetect/Scripts/DomainToolsIrisDetectStatusUpdate/DomainToolsIrisDetectStatusUpdate.yml index 3049719ae86..b585be3f567 100644 --- a/Packs/DomainToolsIrisDetect/Scripts/DomainToolsIrisDetectStatusUpdate/DomainToolsIrisDetectStatusUpdate.yml +++ b/Packs/DomainToolsIrisDetect/Scripts/DomainToolsIrisDetectStatusUpdate/DomainToolsIrisDetectStatusUpdate.yml @@ -10,7 +10,7 @@ tags: - field-change-triggered timeout: 180ns type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole runonce: false tests: diff --git a/Packs/DomainToolsIrisDetect/pack_metadata.json b/Packs/DomainToolsIrisDetect/pack_metadata.json index aa32d0a8090..df9da8b0429 100644 --- a/Packs/DomainToolsIrisDetect/pack_metadata.json +++ b/Packs/DomainToolsIrisDetect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DomainTools Iris Detect", "description": "Iris Detect protects against malicious domains impersonating your brands and supply chain.", "support": "partner", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "DomainTools Integrations", "url": "http://www.domaintools.com", "email": "enterprisesupport@domaintools.com", diff --git a/Packs/DragosWorldview/Integrations/DragosWorldview/DragosWorldview.yml b/Packs/DragosWorldview/Integrations/DragosWorldview/DragosWorldview.yml index 3ab078ae277..77da1f767af 100644 --- a/Packs/DragosWorldview/Integrations/DragosWorldview/DragosWorldview.yml +++ b/Packs/DragosWorldview/Integrations/DragosWorldview/DragosWorldview.yml @@ -184,7 +184,7 @@ script: required: true description: Get the stix2 json bundle of indicators from a given report. name: dragos-get-stix2 - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 isFetchSamples: true isfetch: true script: '' diff --git a/Packs/DragosWorldview/ReleaseNotes/1_1_5.md b/Packs/DragosWorldview/ReleaseNotes/1_1_5.md new file mode 100644 index 00000000000..71892e1edf8 --- /dev/null +++ b/Packs/DragosWorldview/ReleaseNotes/1_1_5.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Dragos Worldview +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/DragosWorldview/pack_metadata.json b/Packs/DragosWorldview/pack_metadata.json index 8bee0dc19d9..2d95916ce27 100644 --- a/Packs/DragosWorldview/pack_metadata.json +++ b/Packs/DragosWorldview/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Dragos Worldview", "description": "The pack contains an integration that pulls from the Dragos Worldview API. The integration can be configured to fetch report as incidents. The integration has commands which can pull the indicators related to a report and any files associated with the report in the API.", "support": "community", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "Accenture", "url": "", "email": "", diff --git a/Packs/Druva/Integrations/DruvaEventCollector/DruvaEventCollector.yml b/Packs/Druva/Integrations/DruvaEventCollector/DruvaEventCollector.yml index 2155d2c272a..1c279c468da 100644 --- a/Packs/Druva/Integrations/DruvaEventCollector/DruvaEventCollector.yml +++ b/Packs/Druva/Integrations/DruvaEventCollector/DruvaEventCollector.yml @@ -50,7 +50,7 @@ script: description: Gets events from Druva API in one batch (max 500). If tracker is given, only its successive events will be fetched. execution: false name: druva-get-events - dockerimage: demisto/python3:3.10.14.99474 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true runonce: false script: '-' diff --git a/Packs/Druva/ReleaseNotes/1_2_3.md b/Packs/Druva/ReleaseNotes/1_2_3.md new file mode 100644 index 00000000000..21c8e2fe683 --- /dev/null +++ b/Packs/Druva/ReleaseNotes/1_2_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Druva Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Druva/pack_metadata.json b/Packs/Druva/pack_metadata.json index 4e6866f06c5..acb34008661 100644 --- a/Packs/Druva/pack_metadata.json +++ b/Packs/Druva/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Druva", "description": "Centrally orchestrate ransomware response and recovery via API integrations and automated playbooks. This content pack will empower you to get back to normal faster after security incidents such as insider threats and ransomware attacks.", "support": "partner", - "currentVersion": "1.2.2", + "currentVersion": "1.2.3", "author": "Druva", "url": "", "email": "techpartners@druva.com", diff --git a/Packs/Endace/Integrations/Endace/Endace.yml b/Packs/Endace/Integrations/Endace/Endace.yml index 153fa795006..35bfc991f1d 100644 --- a/Packs/Endace/Integrations/Endace/Endace.yml +++ b/Packs/Endace/Integrations/Endace/Endace.yml @@ -266,7 +266,7 @@ script: - contextPath: Endace.ArchivedFile.Delete.Error description: Delete Error type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Endace/ReleaseNotes/1_1_13.md b/Packs/Endace/ReleaseNotes/1_1_13.md new file mode 100644 index 00000000000..bc534efb0db --- /dev/null +++ b/Packs/Endace/ReleaseNotes/1_1_13.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Endace + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Endace/pack_metadata.json b/Packs/Endace/pack_metadata.json index f310aa01bb5..d642c19026e 100644 --- a/Packs/Endace/pack_metadata.json +++ b/Packs/Endace/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Endace", "description": "This integration uses Endace APIs to search, archive and download PCAP file from either a single EndaceProbe or many via the InvestigationManager and enables integration of full historical packet capture into security automation workflows", "support": "partner", - "currentVersion": "1.1.12", + "currentVersion": "1.1.13", "author": "Endace", "url": "https://www.endace.com/", "email": "support@endace.com", diff --git a/Packs/ExtraHop/ReleaseNotes/2_2_9.md b/Packs/ExtraHop/ReleaseNotes/2_2_9.md new file mode 100644 index 00000000000..ad9b559ed40 --- /dev/null +++ b/Packs/ExtraHop/ReleaseNotes/2_2_9.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### ExtraHopTrackIncidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml b/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml index df94c0b95e7..ff0dec10fc5 100644 --- a/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml +++ b/Packs/ExtraHop/Scripts/ExtraHopTrackIncidents/ExtraHopTrackIncidents.yml @@ -15,7 +15,7 @@ scripttarget: 0 dependson: must: - 'ExtraHop v2|||extrahop-ticket-track' -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - ExtraHop_v2-Test diff --git a/Packs/ExtraHop/pack_metadata.json b/Packs/ExtraHop/pack_metadata.json index a130bef17d2..508ed285641 100644 --- a/Packs/ExtraHop/pack_metadata.json +++ b/Packs/ExtraHop/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ExtraHop Reveal(x)", "description": "Network detection and response. Complete visibility of network communications at enterprise scale, real-time threat detections backed by machine learning, and guided investigation workflows that simplify response.", "support": "partner", - "currentVersion": "2.2.8", + "currentVersion": "2.2.9", "author": "ExtraHop", "url": "https://customer.extrahop.com/s/", "email": "", diff --git a/Packs/FeedBambenekConsulting/Integrations/FeedBambenekConsulting/FeedBambenekConsulting.yml b/Packs/FeedBambenekConsulting/Integrations/FeedBambenekConsulting/FeedBambenekConsulting.yml index d17371b51a4..5fd8ad8f98b 100644 --- a/Packs/FeedBambenekConsulting/Integrations/FeedBambenekConsulting/FeedBambenekConsulting.yml +++ b/Packs/FeedBambenekConsulting/Integrations/FeedBambenekConsulting/FeedBambenekConsulting.yml @@ -125,7 +125,7 @@ script: name: indicator_type description: Gets the feed indicators. name: bambenek-get-indicators - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedBambenekConsulting/ReleaseNotes/1_2_5.md b/Packs/FeedBambenekConsulting/ReleaseNotes/1_2_5.md new file mode 100644 index 00000000000..cf77a467396 --- /dev/null +++ b/Packs/FeedBambenekConsulting/ReleaseNotes/1_2_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Bambenek Consulting Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedBambenekConsulting/pack_metadata.json b/Packs/FeedBambenekConsulting/pack_metadata.json index 7d571b5509b..a8fc99bfd06 100644 --- a/Packs/FeedBambenekConsulting/pack_metadata.json +++ b/Packs/FeedBambenekConsulting/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bambenek Consulting Feed", "description": "Indicators feed from Bambenek Consulting", "support": "partner", - "currentVersion": "1.2.4", + "currentVersion": "1.2.5", "author": "Bambenek Labs", "url": "https://wellfedintelligence.com/", "email": "support@bambenekconsulting.com", diff --git a/Packs/FeedCofense/Integrations/FeedCofense/FeedCofense.yml b/Packs/FeedCofense/Integrations/FeedCofense/FeedCofense.yml index af847ecc157..f8dd5c5f2f9 100644 --- a/Packs/FeedCofense/Integrations/FeedCofense/FeedCofense.yml +++ b/Packs/FeedCofense/Integrations/FeedCofense/FeedCofense.yml @@ -113,7 +113,7 @@ script: name: from_time description: Gets indicators from the feed. name: cofense-get-indicators - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedCofense/ReleaseNotes/1_1_6.md b/Packs/FeedCofense/ReleaseNotes/1_1_6.md new file mode 100644 index 00000000000..c6d7218941b --- /dev/null +++ b/Packs/FeedCofense/ReleaseNotes/1_1_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cofense Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedCofense/pack_metadata.json b/Packs/FeedCofense/pack_metadata.json index f8ad1745fae..390fcc9f591 100644 --- a/Packs/FeedCofense/pack_metadata.json +++ b/Packs/FeedCofense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cofense Feed", "description": "Ingest human-verified phishing indicators from Cofense Intelligence. Cofense Intelligence is reliable, human-verified phishing intelligence for actionable defense and strategic planning. Cofense researchers track emerging trends in phishing, research active threats, and supplement highest-priority investigations.", "support": "partner", - "currentVersion": "1.1.5", + "currentVersion": "1.1.6", "author": "Cofense", "url": "https://cofense.com/contact-support/", "email": "support@cofense.com", diff --git a/Packs/FeedCyCognito/ReleaseNotes/1_0_25.md b/Packs/FeedCyCognito/ReleaseNotes/1_0_25.md new file mode 100644 index 00000000000..3dbcbdd28d9 --- /dev/null +++ b/Packs/FeedCyCognito/ReleaseNotes/1_0_25.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### FeedCyCognitoGetAssetEndpoint + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml b/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml index 1d00e253a91..f42d6f67828 100644 --- a/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml +++ b/Packs/FeedCyCognito/Scripts/FeedCyCognitoGetAssetEndpoint/FeedCyCognitoGetAssetEndpoint.yml @@ -11,7 +11,7 @@ enabled: true script: '' scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/FeedCyCognito/pack_metadata.json b/Packs/FeedCyCognito/pack_metadata.json index 5018535439e..c99187aae09 100644 --- a/Packs/FeedCyCognito/pack_metadata.json +++ b/Packs/FeedCyCognito/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CyCognito Feed", "description": "Provides a feed integration to retrieve the discovered assets.", "support": "partner", - "currentVersion": "1.0.24", + "currentVersion": "1.0.25", "author": "CyCognito", "url": "", "email": "support@cycognito.com", diff --git a/Packs/FeedCyrenThreatInDepth/Integrations/CyrenThreatInDepth/CyrenThreatInDepth.yml b/Packs/FeedCyrenThreatInDepth/Integrations/CyrenThreatInDepth/CyrenThreatInDepth.yml index 1a374fa4bda..1f347d7d580 100644 --- a/Packs/FeedCyrenThreatInDepth/Integrations/CyrenThreatInDepth/CyrenThreatInDepth.yml +++ b/Packs/FeedCyrenThreatInDepth/Integrations/CyrenThreatInDepth/CyrenThreatInDepth.yml @@ -132,7 +132,7 @@ script: - description: Prints the max client offset stored in the integration context. execution: true name: cyren-threat-indepth-get-client-offset - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false subtype: python3 diff --git a/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_28.md b/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_28.md new file mode 100644 index 00000000000..db36c378422 --- /dev/null +++ b/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_28.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Cyren Threat InDepth Threat Intelligence Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedCyrenThreatInDepth/pack_metadata.json b/Packs/FeedCyrenThreatInDepth/pack_metadata.json index 0f31b89f525..b6803d04bd2 100644 --- a/Packs/FeedCyrenThreatInDepth/pack_metadata.json +++ b/Packs/FeedCyrenThreatInDepth/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cyren Threat InDepth Threat Intelligence", "description": "Threat InDepth's actionable and contextualized intelligence helps enterprises improve their threat detection and response by providing unprecedented visibility into new email-borne security threats faster than other security vendors.", "support": "community", - "currentVersion": "1.5.27", + "currentVersion": "1.5.28", "author": "Cyren", "url": "", "email": "", diff --git a/Packs/FeedFeedly/Integrations/FeedFeedly/FeedFeedly.yml b/Packs/FeedFeedly/Integrations/FeedFeedly/FeedFeedly.yml index 9c5935265ba..d2f937e1ee5 100644 --- a/Packs/FeedFeedly/Integrations/FeedFeedly/FeedFeedly.yml +++ b/Packs/FeedFeedly/Integrations/FeedFeedly/FeedFeedly.yml @@ -116,7 +116,7 @@ script: description: Gets indicators from the feed. execution: false name: feedly-get-indicators - dockerimage: demisto/python3:3.10.14.94490 + dockerimage: demisto/python3:3.11.10.115186 feed: true isfetch: false longRunning: false diff --git a/Packs/FeedFeedly/ReleaseNotes/1_0_5.md b/Packs/FeedFeedly/ReleaseNotes/1_0_5.md new file mode 100644 index 00000000000..1281a610678 --- /dev/null +++ b/Packs/FeedFeedly/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Feedly Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedFeedly/pack_metadata.json b/Packs/FeedFeedly/pack_metadata.json index 3d8f500c6ea..6cbc847f746 100644 --- a/Packs/FeedFeedly/pack_metadata.json +++ b/Packs/FeedFeedly/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Feedly", "description": "Import Articles from Feedly with enriched IOCs", "support": "partner", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Feedly", "url": "https://feedly.com/i/landing/threatIntelligence", "email": "support@feedly.com", diff --git a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml index 90a855ff8fd..0c864cdcb4d 100644 --- a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml +++ b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/Integrations/ReversingLabsRansomwareAndRelatedToolsFeed/ReversingLabsRansomwareAndRelatedToolsFeed.yml @@ -122,7 +122,7 @@ script: defaultValue: 1 description: Defines how many hours back in time should the indicators be fetched from. Value should be between 1 and 4. Recommended value is 1. description: Gets indicators from the feed. - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 feed: true subtype: python3 fromversion: 6.0.0 diff --git a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/ReleaseNotes/1_0_4.md b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/ReleaseNotes/1_0_4.md new file mode 100644 index 00000000000..5b1b09d1d12 --- /dev/null +++ b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ReversingLabs Ransomware and Related Tools Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/pack_metadata.json b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/pack_metadata.json index b1169771156..363e5999355 100644 --- a/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/pack_metadata.json +++ b/Packs/FeedReversingLabsRansomwareAndRelatedToolsApp/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ReversingLabs Ransomware and Related Tools Feed", "description": "A timely and curated threat intel list containing recent indicators extracted from ransomware and the tools used to deploy ransomware which are suitable for threat hunting or deployment to security controls.", "support": "partner", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "ReversingLabs", "url": "https://www.reversinglabs.com", "email": "support@reversinglabs.com", diff --git a/Packs/FileOrbis/Integrations/FileOrbis/FileOrbis.yml b/Packs/FileOrbis/Integrations/FileOrbis/FileOrbis.yml index 779d29a7169..1e5da0e87c0 100644 --- a/Packs/FileOrbis/Integrations/FileOrbis/FileOrbis.yml +++ b/Packs/FileOrbis/Integrations/FileOrbis/FileOrbis.yml @@ -58,7 +58,7 @@ script: - contextPath: FileOrbis.UserStatus.Message description: User friendly result message of the operation type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/FileOrbis/ReleaseNotes/1_0_5.md b/Packs/FileOrbis/ReleaseNotes/1_0_5.md new file mode 100644 index 00000000000..6ec9b9932d9 --- /dev/null +++ b/Packs/FileOrbis/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### FileOrbis + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FileOrbis/pack_metadata.json b/Packs/FileOrbis/pack_metadata.json index 69f42f181d4..2f7e2df7438 100644 --- a/Packs/FileOrbis/pack_metadata.json +++ b/Packs/FileOrbis/pack_metadata.json @@ -2,7 +2,7 @@ "name": "FileOrbis", "description": "FileOrbis XSOAR integration.", "support": "partner", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "FileOrbis", "url": "https://www.fileorbis.com/", "email": "info@fileorbis.com", diff --git a/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml b/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml index ebac11fec08..dff97d212fd 100644 --- a/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml +++ b/Packs/FireEye-Detection-on-Demand/Integrations/FireEye-Detection-on-Demand/FireEye-Detection-on-Demand.yml @@ -27,7 +27,7 @@ configuration: script: script: '' type: python - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 commands: diff --git a/Packs/FireEye-Detection-on-Demand/ReleaseNotes/1_0_6.md b/Packs/FireEye-Detection-on-Demand/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..954043ac484 --- /dev/null +++ b/Packs/FireEye-Detection-on-Demand/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### FireEye Detection on Demand + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FireEye-Detection-on-Demand/pack_metadata.json b/Packs/FireEye-Detection-on-Demand/pack_metadata.json index 549b3b24435..3e726b0352d 100644 --- a/Packs/FireEye-Detection-on-Demand/pack_metadata.json +++ b/Packs/FireEye-Detection-on-Demand/pack_metadata.json @@ -2,7 +2,7 @@ "name": "FireEye Detection on Demand", "description": "Detonate files, hashes, and URLs using FireEye Detection on Demand", "support": "partner", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "FireEye Inc.", "githubUser": [ "mckibbenc", diff --git a/Packs/FireMonSecurityManager/Integrations/FireMonSecurityManager/FireMonSecurityManager.yml b/Packs/FireMonSecurityManager/Integrations/FireMonSecurityManager/FireMonSecurityManager.yml index 9ae92eb23a6..584f6ce1563 100644 --- a/Packs/FireMonSecurityManager/Integrations/FireMonSecurityManager/FireMonSecurityManager.yml +++ b/Packs/FireMonSecurityManager/Integrations/FireMonSecurityManager/FireMonSecurityManager.yml @@ -136,7 +136,7 @@ script: outputs: - contextPath: FireMonSecurityManager.CollectorStatus description: Firemon Collector Status. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/FireMonSecurityManager/ReleaseNotes/1_2_1.md b/Packs/FireMonSecurityManager/ReleaseNotes/1_2_1.md new file mode 100644 index 00000000000..972b8890e62 --- /dev/null +++ b/Packs/FireMonSecurityManager/ReleaseNotes/1_2_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### FireMon Security Manager + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/FireMonSecurityManager/pack_metadata.json b/Packs/FireMonSecurityManager/pack_metadata.json index 9d7481eaacb..4d39190f024 100644 --- a/Packs/FireMonSecurityManager/pack_metadata.json +++ b/Packs/FireMonSecurityManager/pack_metadata.json @@ -2,7 +2,7 @@ "name": "FireMon Security Manager", "description": "Creates a Policy Planner Ticket in Policy Planner Application and Validates Pre Changes assessments for new requirement.", "support": "community", - "currentVersion": "1.2.0", + "currentVersion": "1.2.1", "author": "FireMon", "url": "", "email": "", diff --git a/Packs/ForwardXSOARAuditLogsToSplunkHEC/ReleaseNotes/1_0_3.md b/Packs/ForwardXSOARAuditLogsToSplunkHEC/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..6bc9b551140 --- /dev/null +++ b/Packs/ForwardXSOARAuditLogsToSplunkHEC/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### ForwardAuditLogsToSplunkHEC + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ForwardXSOARAuditLogsToSplunkHEC/Scripts/ForwardAuditLogsToSplunkHEC/ForwardAuditLogsToSplunkHEC.yml b/Packs/ForwardXSOARAuditLogsToSplunkHEC/Scripts/ForwardAuditLogsToSplunkHEC/ForwardAuditLogsToSplunkHEC.yml index fcab79fda15..41b7c941a43 100644 --- a/Packs/ForwardXSOARAuditLogsToSplunkHEC/Scripts/ForwardAuditLogsToSplunkHEC/ForwardAuditLogsToSplunkHEC.yml +++ b/Packs/ForwardXSOARAuditLogsToSplunkHEC/Scripts/ForwardAuditLogsToSplunkHEC/ForwardAuditLogsToSplunkHEC.yml @@ -9,7 +9,7 @@ commonfields: version: -1 dependson: must: [] -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ForwardAuditLogsToSplunkHEC runas: DBotWeakRole diff --git a/Packs/ForwardXSOARAuditLogsToSplunkHEC/pack_metadata.json b/Packs/ForwardXSOARAuditLogsToSplunkHEC/pack_metadata.json index b4c80fc7840..6c2f4d34fc2 100644 --- a/Packs/ForwardXSOARAuditLogsToSplunkHEC/pack_metadata.json +++ b/Packs/ForwardXSOARAuditLogsToSplunkHEC/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Forward XSOAR Audit Logs to Splunk HEC", "description": "This automation script takes a timeframe as input fetches the audit logs for the defined period. Then it pushes them to Splunk HEC. ", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Harri Ruuttila", "url": "", "email": "", diff --git a/Packs/GLPI/ReleaseNotes/1_0_23.md b/Packs/GLPI/ReleaseNotes/1_0_23.md new file mode 100644 index 00000000000..c1d1e062ef1 --- /dev/null +++ b/Packs/GLPI/ReleaseNotes/1_0_23.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### GLPIIncidentStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/GLPI/Scripts/GLPIIncidentStatus/GLPIIncidentStatus.yml b/Packs/GLPI/Scripts/GLPIIncidentStatus/GLPIIncidentStatus.yml index 24fa91b3f54..d8d8d9d9596 100644 --- a/Packs/GLPI/Scripts/GLPIIncidentStatus/GLPIIncidentStatus.yml +++ b/Packs/GLPI/Scripts/GLPIIncidentStatus/GLPIIncidentStatus.yml @@ -3,7 +3,7 @@ comment: | commonfields: id: GLPIIncidentStatus version: -1 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: GLPIIncidentStatus runas: DBotWeakRole diff --git a/Packs/GLPI/pack_metadata.json b/Packs/GLPI/pack_metadata.json index c4a60f5521e..b691505d603 100644 --- a/Packs/GLPI/pack_metadata.json +++ b/Packs/GLPI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "GLPI", "description": "GLPI open source ITSM solution", "support": "partner", - "currentVersion": "1.0.22", + "currentVersion": "1.0.23", "author": "SecInfra", "url": "http://secinfra.fr", "email": "support@secinfra.fr", diff --git a/Packs/Gatewatcher-AionIQ/Integrations/GCenter/GCenter.yml b/Packs/Gatewatcher-AionIQ/Integrations/GCenter/GCenter.yml index f7fde6aa6da..0c0b6032e4e 100644 --- a/Packs/Gatewatcher-AionIQ/Integrations/GCenter/GCenter.yml +++ b/Packs/Gatewatcher-AionIQ/Integrations/GCenter/GCenter.yml @@ -1312,7 +1312,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - Gcenter Test Playbook diff --git a/Packs/Gatewatcher-AionIQ/ReleaseNotes/1_1_22.md b/Packs/Gatewatcher-AionIQ/ReleaseNotes/1_1_22.md new file mode 100644 index 00000000000..8cfe5575404 --- /dev/null +++ b/Packs/Gatewatcher-AionIQ/ReleaseNotes/1_1_22.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### GCenter +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Gatewatcher-AionIQ/pack_metadata.json b/Packs/Gatewatcher-AionIQ/pack_metadata.json index 5f9d7f1b16c..8d085432f25 100644 --- a/Packs/Gatewatcher-AionIQ/pack_metadata.json +++ b/Packs/Gatewatcher-AionIQ/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Gatewatcher AionIQ", "description": "This pack provide integration with Gatewatcher NDR solution : AIonIQ", "support": "partner", - "currentVersion": "1.1.21", + "currentVersion": "1.1.22", "author": "Gatewatcher", "url": "https://www.gatewatcher.com/", "email": "integration@gatewatcher.com", diff --git a/Packs/Gem/ReleaseNotes/1_0_4.md b/Packs/Gem/ReleaseNotes/1_0_4.md new file mode 100644 index 00000000000..896be51a60f --- /dev/null +++ b/Packs/Gem/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### ResolveGemAlert + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Gem/Scripts/ResolveGemAlert/ResolveGemAlert.yml b/Packs/Gem/Scripts/ResolveGemAlert/ResolveGemAlert.yml index b1b29b122ed..04ae372860d 100644 --- a/Packs/Gem/Scripts/ResolveGemAlert/ResolveGemAlert.yml +++ b/Packs/Gem/Scripts/ResolveGemAlert/ResolveGemAlert.yml @@ -2,7 +2,7 @@ comment: "Post Processing Script that will resolve the relevant Threat in the Ge commonfields: id: ResolveGemAlert version: -1 -dockerimage: demisto/python3:3.10.13.89873 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ResolveGemAlert runas: DBotWeakRole diff --git a/Packs/Gem/pack_metadata.json b/Packs/Gem/pack_metadata.json index ecd6b4903e5..71fb9d5a5d4 100644 --- a/Packs/Gem/pack_metadata.json +++ b/Packs/Gem/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Gem", "description": "Integrate with Gem to use alerts as a trigger for Cortex XSOAR’s custom playbooks, and automate response to specific TTPs and scenarios.", "support": "partner", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Gem Security", "url": "https://gem.security/", "email": "support@gem.security", diff --git a/Packs/Genians/Integrations/Genians/Genians.yml b/Packs/Genians/Integrations/Genians/Genians.yml index 3378e0b20f9..d02a0241c6a 100644 --- a/Packs/Genians/Integrations/Genians/Genians.yml +++ b/Packs/Genians/Integrations/Genians/Genians.yml @@ -59,7 +59,7 @@ script: description: Tag name. type: string description: Removes the tag(s) from the Node specified. - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Genians/ReleaseNotes/1_0_11.md b/Packs/Genians/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..4d8b881f9a5 --- /dev/null +++ b/Packs/Genians/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Genians + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Genians/pack_metadata.json b/Packs/Genians/pack_metadata.json index 3bfa3ea4c8f..4c74acf76bf 100644 --- a/Packs/Genians/pack_metadata.json +++ b/Packs/Genians/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Genians", "description": "Use the Genian NAC integration to block IP addresses using the assign tag.", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Genians", "url": "https://www.genians.com/resources-overview/", "email": "integration@genians.com", diff --git a/Packs/GoogleChatViaWebhook/Integrations/GoogleChatViaWebhook/GoogleChatViaWebhook.yml b/Packs/GoogleChatViaWebhook/Integrations/GoogleChatViaWebhook/GoogleChatViaWebhook.yml index 2066d319f2d..f5e06cbc156 100644 --- a/Packs/GoogleChatViaWebhook/Integrations/GoogleChatViaWebhook/GoogleChatViaWebhook.yml +++ b/Packs/GoogleChatViaWebhook/Integrations/GoogleChatViaWebhook/GoogleChatViaWebhook.yml @@ -98,7 +98,7 @@ script: description: Google Chat thread name. - contextPath: GoogleChatWebhook.CustomCard.SenderDisplayName description: Google Chat custom card sender display name. - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/GoogleChatViaWebhook/ReleaseNotes/1_0_1.md b/Packs/GoogleChatViaWebhook/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..3c6e770b8db --- /dev/null +++ b/Packs/GoogleChatViaWebhook/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Google Chat via Webhook + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/GoogleChatViaWebhook/pack_metadata.json b/Packs/GoogleChatViaWebhook/pack_metadata.json index 4624436b21d..523f41d07f8 100644 --- a/Packs/GoogleChatViaWebhook/pack_metadata.json +++ b/Packs/GoogleChatViaWebhook/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Google Chat via Webhook", "description": "Integration for sending notifications to a Google Chat Space via incoming webhook", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Rich Fontaine, Brandon Parmely", "url": "", "email": "", diff --git a/Packs/GoogleChronicleBackstory/ReleaseNotes/4_0_4.md b/Packs/GoogleChronicleBackstory/ReleaseNotes/4_0_4.md new file mode 100644 index 00000000000..d6dbdcef117 --- /dev/null +++ b/Packs/GoogleChronicleBackstory/ReleaseNotes/4_0_4.md @@ -0,0 +1,45 @@ + +#### Scripts + +##### ChronicleDBotScoreWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleAssetEventsForProductIDWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleIsolatedHostnameWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleIsolatedIPWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleAssetEventsForHostnameWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleAssetEventsForIPWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleDomainIntelligenceSourcesWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ConvertDomainToURLs + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleListDeviceEventsByEventTypeWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleAssetIdentifierScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChroniclePotentiallyBlockedIPWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ListDeviceEvents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ExtractDomainFromIOCDomainMatchRes + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ChronicleAssetEventsForMACWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForHostnameWidgetScript/ChronicleAssetEventsForHostnameWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForHostnameWidgetScript/ChronicleAssetEventsForHostnameWidgetScript.yml index a8bf95c7f5f..e4c369a1edb 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForHostnameWidgetScript/ChronicleAssetEventsForHostnameWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForHostnameWidgetScript/ChronicleAssetEventsForHostnameWidgetScript.yml @@ -14,7 +14,7 @@ dependson: must: - '|||gcb-list-events' timeout: 300ns -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForIPWidgetScript/ChronicleAssetEventsForIPWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForIPWidgetScript/ChronicleAssetEventsForIPWidgetScript.yml index ff3b029cee0..4719c9f5ded 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForIPWidgetScript/ChronicleAssetEventsForIPWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForIPWidgetScript/ChronicleAssetEventsForIPWidgetScript.yml @@ -14,7 +14,7 @@ dependson: must: - '|||gcb-list-events' timeout: 300ns -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForMACWidgetScript/ChronicleAssetEventsForMACWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForMACWidgetScript/ChronicleAssetEventsForMACWidgetScript.yml index 3d22f1bbaaa..95344355623 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForMACWidgetScript/ChronicleAssetEventsForMACWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForMACWidgetScript/ChronicleAssetEventsForMACWidgetScript.yml @@ -14,7 +14,7 @@ dependson: must: - '|||gcb-list-events' timeout: 300ns -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForProductIDWidgetScript/ChronicleAssetEventsForProductIDWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForProductIDWidgetScript/ChronicleAssetEventsForProductIDWidgetScript.yml index 112edb1bd42..b807383cf75 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForProductIDWidgetScript/ChronicleAssetEventsForProductIDWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetEventsForProductIDWidgetScript/ChronicleAssetEventsForProductIDWidgetScript.yml @@ -14,7 +14,7 @@ dependson: must: - '|||gcb-list-events' timeout: 300ns -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetIdentifierScript/ChronicleAssetIdentifierScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetIdentifierScript/ChronicleAssetIdentifierScript.yml index b0f89ca6289..7176d3921fb 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetIdentifierScript/ChronicleAssetIdentifierScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleAssetIdentifierScript/ChronicleAssetIdentifierScript.yml @@ -17,7 +17,7 @@ outputs: type: Unknown scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleDBotScoreWidgetScript/ChronicleDBotScoreWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleDBotScoreWidgetScript/ChronicleDBotScoreWidgetScript.yml index 89967df03cc..f2b23dc0c6d 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleDBotScoreWidgetScript/ChronicleDBotScoreWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleDBotScoreWidgetScript/ChronicleDBotScoreWidgetScript.yml @@ -10,7 +10,7 @@ comment: Shows the DBot Score and reputation of the Domain. enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleDomainIntelligenceSourcesWidgetScript/ChronicleDomainIntelligenceSourcesWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleDomainIntelligenceSourcesWidgetScript/ChronicleDomainIntelligenceSourcesWidgetScript.yml index 8f27c3760ae..fca950d8e22 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleDomainIntelligenceSourcesWidgetScript/ChronicleDomainIntelligenceSourcesWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleDomainIntelligenceSourcesWidgetScript/ChronicleDomainIntelligenceSourcesWidgetScript.yml @@ -10,7 +10,7 @@ comment: Shows the details of sources in the Chronicle Domain Intelligence Sourc enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedHostnameWidgetScript/ChronicleIsolatedHostnameWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedHostnameWidgetScript/ChronicleIsolatedHostnameWidgetScript.yml index 07ebd2b609d..38186680dff 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedHostnameWidgetScript/ChronicleIsolatedHostnameWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedHostnameWidgetScript/ChronicleIsolatedHostnameWidgetScript.yml @@ -10,7 +10,7 @@ comment: Notifies if the hostname associated with the ChronicleAsset is isolated enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedIPWidgetScript/ChronicleIsolatedIPWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedIPWidgetScript/ChronicleIsolatedIPWidgetScript.yml index 42dc71d4290..bf56c80bce5 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedIPWidgetScript/ChronicleIsolatedIPWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleIsolatedIPWidgetScript/ChronicleIsolatedIPWidgetScript.yml @@ -10,7 +10,7 @@ comment: Notifies if the IP address associated with the ChronicleAsset is isolat enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChronicleListDeviceEventsByEventTypeWidgetScript/ChronicleListDeviceEventsByEventTypeWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChronicleListDeviceEventsByEventTypeWidgetScript/ChronicleListDeviceEventsByEventTypeWidgetScript.yml index 916295d6095..f9c53a49987 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChronicleListDeviceEventsByEventTypeWidgetScript/ChronicleListDeviceEventsByEventTypeWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChronicleListDeviceEventsByEventTypeWidgetScript/ChronicleListDeviceEventsByEventTypeWidgetScript.yml @@ -10,7 +10,7 @@ comment: Displays a pie chart of the number of events, categorized by its event enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ChroniclePotentiallyBlockedIPWidgetScript/ChroniclePotentiallyBlockedIPWidgetScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ChroniclePotentiallyBlockedIPWidgetScript/ChroniclePotentiallyBlockedIPWidgetScript.yml index 3939af4cb30..d1334b9f618 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ChroniclePotentiallyBlockedIPWidgetScript/ChroniclePotentiallyBlockedIPWidgetScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ChroniclePotentiallyBlockedIPWidgetScript/ChroniclePotentiallyBlockedIPWidgetScript.yml @@ -10,7 +10,7 @@ comment: Notifies if the IP address associated with the ChronicleAsset is potent enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ConvertDomainToURLs/ConvertDomainToURLs.yml b/Packs/GoogleChronicleBackstory/Scripts/ConvertDomainToURLs/ConvertDomainToURLs.yml index d536cefb893..a29801d5949 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ConvertDomainToURLs/ConvertDomainToURLs.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ConvertDomainToURLs/ConvertDomainToURLs.yml @@ -16,7 +16,7 @@ outputs: description: Converted URLs scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ExtractDomainFromIOCDomainMatchRes/ExtractDomainFromIOCDomainMatchRes.yml b/Packs/GoogleChronicleBackstory/Scripts/ExtractDomainFromIOCDomainMatchRes/ExtractDomainFromIOCDomainMatchRes.yml index cdeba1bf7a4..9624208e4c4 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ExtractDomainFromIOCDomainMatchRes/ExtractDomainFromIOCDomainMatchRes.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ExtractDomainFromIOCDomainMatchRes/ExtractDomainFromIOCDomainMatchRes.yml @@ -28,7 +28,7 @@ outputs: type: date scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml b/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml index e9726e8e23e..8e2c804ad3e 100644 --- a/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml +++ b/Packs/GoogleChronicleBackstory/Scripts/ListDeviceEventsScript/ListDeviceEventsScript.yml @@ -1099,7 +1099,7 @@ tags: - enhancement timeout: '0' type: python -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/GoogleChronicleBackstory/pack_metadata.json b/Packs/GoogleChronicleBackstory/pack_metadata.json index e098725e358..a4e8934d7ee 100644 --- a/Packs/GoogleChronicleBackstory/pack_metadata.json +++ b/Packs/GoogleChronicleBackstory/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Chronicle", "description": "Retrieve Chronicle detections, impacted assets, IOC matches, and 3P alerts to enrich your XSOAR workflows.", "support": "partner", - "currentVersion": "4.0.3", + "currentVersion": "4.0.4", "certification": "certified", "author": "Chronicle", "url": "https://go.chronicle.security/contact", diff --git a/Packs/HYASInsight/Integrations/HYASInsight/HYASInsight.yml b/Packs/HYASInsight/Integrations/HYASInsight/HYASInsight.yml index 2e259069e12..713884ccc5d 100644 --- a/Packs/HYASInsight/Integrations/HYASInsight/HYASInsight.yml +++ b/Packs/HYASInsight/Integrations/HYASInsight/HYASInsight.yml @@ -785,7 +785,7 @@ script: - contextPath: HYAS.HASH-DOMAIN.md5 description: The provided MD5 value. type: String - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/HYASInsight/ReleaseNotes/1_1_4.md b/Packs/HYASInsight/ReleaseNotes/1_1_4.md new file mode 100644 index 00000000000..0ddb81cf3f2 --- /dev/null +++ b/Packs/HYASInsight/ReleaseNotes/1_1_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### HYAS Insight + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/HYASInsight/pack_metadata.json b/Packs/HYASInsight/pack_metadata.json index 737d26d9554..bc4aff2811d 100644 --- a/Packs/HYASInsight/pack_metadata.json +++ b/Packs/HYASInsight/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HYAS Insight", "description": "Use the HYAS Insight integration to interactively lookup PassiveDNS, DynamicDNS, WHOIS, Sample Malware Records, C2 Attribution, Passive Hash, SSL Certificate, Open Source Indicators, Device Geo, Sinkhole, Malware Sample Information Information either as playbook tasks or through API calls in the War Room.", "support": "partner", - "currentVersion": "1.1.3", + "currentVersion": "1.1.4", "author": "HYAS", "url": "https://support.hyas.com", "email": "support@hyas.com", diff --git a/Packs/HYASProtect/Integrations/HYASProtect/HYASProtect.yml b/Packs/HYASProtect/Integrations/HYASProtect/HYASProtect.yml index dbf8eb359aa..11ef6ad773e 100644 --- a/Packs/HYASProtect/Integrations/HYASProtect/HYASProtect.yml +++ b/Packs/HYASProtect/Integrations/HYASProtect/HYASProtect.yml @@ -120,7 +120,7 @@ script: - contextPath: HYAS.NameserverVerdict.reasons description: Verdict Reasons for the provided Nameserver. type: Unknown - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/HYASProtect/ReleaseNotes/1_0_16.md b/Packs/HYASProtect/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..0340e53a160 --- /dev/null +++ b/Packs/HYASProtect/ReleaseNotes/1_0_16.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### HYAS Protect +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/HYASProtect/pack_metadata.json b/Packs/HYASProtect/pack_metadata.json index c7c9164fffd..7189fd7e151 100644 --- a/Packs/HYASProtect/pack_metadata.json +++ b/Packs/HYASProtect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HYAS Protect", "description": "Use the HYAS Protect integration to get the verdict information for FQDN, IP Address and NameServer.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "HYAS", "url": "https://support.hyas.com", "email": "support@hyas.com", diff --git a/Packs/HackerOne/Integrations/HackerOne/HackerOne.yml b/Packs/HackerOne/Integrations/HackerOne/HackerOne.yml index 8d3cedb153a..ebfbe6a87d1 100644 --- a/Packs/HackerOne/Integrations/HackerOne/HackerOne.yml +++ b/Packs/HackerOne/Integrations/HackerOne/HackerOne.yml @@ -559,7 +559,7 @@ script: - contextPath: HackerOne.Program.attributes.updated_at description: The date and time the object was updated. Formatted according to ISO 8601. type: Date - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/HackerOne/ReleaseNotes/1_0_15.md b/Packs/HackerOne/ReleaseNotes/1_0_15.md new file mode 100644 index 00000000000..59e56c08792 --- /dev/null +++ b/Packs/HackerOne/ReleaseNotes/1_0_15.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### HackerOne + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/HackerOne/pack_metadata.json b/Packs/HackerOne/pack_metadata.json index 69b7586f1dd..e7579d2136c 100644 --- a/Packs/HackerOne/pack_metadata.json +++ b/Packs/HackerOne/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HackerOne", "description": "HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with penetration testers and cyber-security researchers.", "support": "partner", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "HackerOne", "url": "https://docs.hackerone.com/", "email": "support@hackerone.com", diff --git a/Packs/Hackuity/Integrations/Hackuity/Hackuity.yml b/Packs/Hackuity/Integrations/Hackuity/Hackuity.yml index 7f700535ee8..a9f75bb7413 100644 --- a/Packs/Hackuity/Integrations/Hackuity/Hackuity.yml +++ b/Packs/Hackuity/Integrations/Hackuity/Hackuity.yml @@ -192,7 +192,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Hackuity/ReleaseNotes/1_0_24.md b/Packs/Hackuity/ReleaseNotes/1_0_24.md new file mode 100644 index 00000000000..d717d92ce6e --- /dev/null +++ b/Packs/Hackuity/ReleaseNotes/1_0_24.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Hackuity +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Hackuity/pack_metadata.json b/Packs/Hackuity/pack_metadata.json index b803493537d..7c757bafb28 100644 --- a/Packs/Hackuity/pack_metadata.json +++ b/Packs/Hackuity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Hackuity", "description": "From a war-room, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock.", "support": "partner", - "currentVersion": "1.0.23", + "currentVersion": "1.0.24", "author": "Hackuity", "url": "https://www.hackuity.io/support", "email": "", diff --git a/Packs/HatchingTriage/Integrations/HatchingTriage/HatchingTriage.yml b/Packs/HatchingTriage/Integrations/HatchingTriage/HatchingTriage.yml index 070eac03d49..bf4f46da655 100644 --- a/Packs/HatchingTriage/Integrations/HatchingTriage/HatchingTriage.yml +++ b/Packs/HatchingTriage/Integrations/HatchingTriage/HatchingTriage.yml @@ -594,7 +594,7 @@ script: required: true name: triage-delete-profile description: Update the profile with the specified ID or name. The stored profile is overwritten, so it is important that the submitted profile has all fields, with the exception of the ID. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/HatchingTriage/ReleaseNotes/1_0_17.md b/Packs/HatchingTriage/ReleaseNotes/1_0_17.md new file mode 100644 index 00000000000..28b7ca8588e --- /dev/null +++ b/Packs/HatchingTriage/ReleaseNotes/1_0_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Hatching Triage + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/HatchingTriage/pack_metadata.json b/Packs/HatchingTriage/pack_metadata.json index a2a03ffc5fe..20c9716b481 100644 --- a/Packs/HatchingTriage/pack_metadata.json +++ b/Packs/HatchingTriage/pack_metadata.json @@ -3,7 +3,7 @@ "description": "Scalable malware sandbox", "support": "partner", "certification": "certified", - "currentVersion": "1.0.16", + "currentVersion": "1.0.17", "author": "Hatching", "url": "https://hatching.io/", "email": "support@hatching.io", diff --git a/Packs/HealthCheck/ReleaseNotes/3_0_2.md b/Packs/HealthCheck/ReleaseNotes/3_0_2.md new file mode 100644 index 00000000000..1e8dbf291e8 --- /dev/null +++ b/Packs/HealthCheck/ReleaseNotes/3_0_2.md @@ -0,0 +1,39 @@ + +#### Scripts + +##### getPlaybooksHealthStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getPlaybooksCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getDiskSpaceStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getCustomAutomations + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getDetachedAutomations + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getAutomationsCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getWorkersCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getSystemHealthStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getDetachedPlaybooks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getInvHealthStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getDockerContainersCount + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### getCustomPlaybooks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/HealthCheck/Scripts/GetAutomationsCount/GetAutomationsCount.yml b/Packs/HealthCheck/Scripts/GetAutomationsCount/GetAutomationsCount.yml index 669a7dfcb39..70784268519 100644 --- a/Packs/HealthCheck/Scripts/GetAutomationsCount/GetAutomationsCount.yml +++ b/Packs/HealthCheck/Scripts/GetAutomationsCount/GetAutomationsCount.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getAutomationsCount diff --git a/Packs/HealthCheck/Scripts/GetCustomAutomations/GetCustomAutomations.yml b/Packs/HealthCheck/Scripts/GetCustomAutomations/GetCustomAutomations.yml index 38d21fde9ca..9bf18f2038d 100644 --- a/Packs/HealthCheck/Scripts/GetCustomAutomations/GetCustomAutomations.yml +++ b/Packs/HealthCheck/Scripts/GetCustomAutomations/GetCustomAutomations.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getCustomAutomations diff --git a/Packs/HealthCheck/Scripts/GetCustomPlaybooks/GetCustomPlaybooks.yml b/Packs/HealthCheck/Scripts/GetCustomPlaybooks/GetCustomPlaybooks.yml index bf1df9ce034..a8ebba20abe 100644 --- a/Packs/HealthCheck/Scripts/GetCustomPlaybooks/GetCustomPlaybooks.yml +++ b/Packs/HealthCheck/Scripts/GetCustomPlaybooks/GetCustomPlaybooks.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getCustomPlaybooks diff --git a/Packs/HealthCheck/Scripts/GetDetachedAutomations/GetDetachedAutomations.yml b/Packs/HealthCheck/Scripts/GetDetachedAutomations/GetDetachedAutomations.yml index f0efdbeefb5..3dffe8ee890 100644 --- a/Packs/HealthCheck/Scripts/GetDetachedAutomations/GetDetachedAutomations.yml +++ b/Packs/HealthCheck/Scripts/GetDetachedAutomations/GetDetachedAutomations.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getDetachedAutomations diff --git a/Packs/HealthCheck/Scripts/GetDetachedPlaybooks/GetDetachedPlaybooks.yml b/Packs/HealthCheck/Scripts/GetDetachedPlaybooks/GetDetachedPlaybooks.yml index 7e0d7f89ae8..d04857eca91 100644 --- a/Packs/HealthCheck/Scripts/GetDetachedPlaybooks/GetDetachedPlaybooks.yml +++ b/Packs/HealthCheck/Scripts/GetDetachedPlaybooks/GetDetachedPlaybooks.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getDetachedPlaybooks diff --git a/Packs/HealthCheck/Scripts/GetDiskSpaceStatus/GetDiskSpaceStatus.yml b/Packs/HealthCheck/Scripts/GetDiskSpaceStatus/GetDiskSpaceStatus.yml index e805e459308..246df58fefc 100644 --- a/Packs/HealthCheck/Scripts/GetDiskSpaceStatus/GetDiskSpaceStatus.yml +++ b/Packs/HealthCheck/Scripts/GetDiskSpaceStatus/GetDiskSpaceStatus.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getDiskSpaceStatus diff --git a/Packs/HealthCheck/Scripts/GetDockerContainersCount/GetDockerContainersCount.yml b/Packs/HealthCheck/Scripts/GetDockerContainersCount/GetDockerContainersCount.yml index e5a97253811..002fe351a2e 100644 --- a/Packs/HealthCheck/Scripts/GetDockerContainersCount/GetDockerContainersCount.yml +++ b/Packs/HealthCheck/Scripts/GetDockerContainersCount/GetDockerContainersCount.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getDockerContainersCount diff --git a/Packs/HealthCheck/Scripts/GetInvHealthStatus/GetInvHealthStatus.yml b/Packs/HealthCheck/Scripts/GetInvHealthStatus/GetInvHealthStatus.yml index 17af20f20dc..c064e7b9b6e 100644 --- a/Packs/HealthCheck/Scripts/GetInvHealthStatus/GetInvHealthStatus.yml +++ b/Packs/HealthCheck/Scripts/GetInvHealthStatus/GetInvHealthStatus.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getInvHealthStatus diff --git a/Packs/HealthCheck/Scripts/GetPlaybooksCount/GetPlaybooksCount.yml b/Packs/HealthCheck/Scripts/GetPlaybooksCount/GetPlaybooksCount.yml index 24d93068c3f..0cfc421db75 100644 --- a/Packs/HealthCheck/Scripts/GetPlaybooksCount/GetPlaybooksCount.yml +++ b/Packs/HealthCheck/Scripts/GetPlaybooksCount/GetPlaybooksCount.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getPlaybooksCount diff --git a/Packs/HealthCheck/Scripts/GetPlaybooksHealthStatus/GetPlaybooksHealthStatus.yml b/Packs/HealthCheck/Scripts/GetPlaybooksHealthStatus/GetPlaybooksHealthStatus.yml index 4203646f4a6..075738ff35d 100644 --- a/Packs/HealthCheck/Scripts/GetPlaybooksHealthStatus/GetPlaybooksHealthStatus.yml +++ b/Packs/HealthCheck/Scripts/GetPlaybooksHealthStatus/GetPlaybooksHealthStatus.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getPlaybooksHealthStatus diff --git a/Packs/HealthCheck/Scripts/GetSystemHealthStatus/GetSystemHealthStatus.yml b/Packs/HealthCheck/Scripts/GetSystemHealthStatus/GetSystemHealthStatus.yml index 9463b6c73ce..e7679291c82 100644 --- a/Packs/HealthCheck/Scripts/GetSystemHealthStatus/GetSystemHealthStatus.yml +++ b/Packs/HealthCheck/Scripts/GetSystemHealthStatus/GetSystemHealthStatus.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getSystemHealthStatus diff --git a/Packs/HealthCheck/Scripts/GetWorkersCount/GetWorkersCount.yml b/Packs/HealthCheck/Scripts/GetWorkersCount/GetWorkersCount.yml index 1687fe5e2c0..e4a666d0f50 100644 --- a/Packs/HealthCheck/Scripts/GetWorkersCount/GetWorkersCount.yml +++ b/Packs/HealthCheck/Scripts/GetWorkersCount/GetWorkersCount.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.14.95137 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: getWorkersCount diff --git a/Packs/HealthCheck/pack_metadata.json b/Packs/HealthCheck/pack_metadata.json index ce9b6b529ba..149dcdd52a0 100644 --- a/Packs/HealthCheck/pack_metadata.json +++ b/Packs/HealthCheck/pack_metadata.json @@ -2,7 +2,7 @@ "name": "System Diagnostics and Health Check", "description": "CS Health Check", "support": "community", - "currentVersion": "3.0.1", + "currentVersion": "3.0.2", "author": "Cortex XSOAR Customer Success", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/HelloWorld/Integrations/HelloWorld/HelloWorld.yml b/Packs/HelloWorld/Integrations/HelloWorld/HelloWorld.yml index 45797170f63..4090636abef 100644 --- a/Packs/HelloWorld/Integrations/HelloWorld/HelloWorld.yml +++ b/Packs/HelloWorld/Integrations/HelloWorld/HelloWorld.yml @@ -290,7 +290,7 @@ script: - contextPath: IP.Relationships.EntityBType description: The type of the destination of the relationship. type: string - dockerimage: demisto/python3:3.10.14.96411 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/HelloWorld/Integrations/HelloWorldEventCollector/HelloWorldEventCollector.yml b/Packs/HelloWorld/Integrations/HelloWorldEventCollector/HelloWorldEventCollector.yml index a40ce1fee4c..cf7891593d4 100644 --- a/Packs/HelloWorld/Integrations/HelloWorldEventCollector/HelloWorldEventCollector.yml +++ b/Packs/HelloWorld/Integrations/HelloWorldEventCollector/HelloWorldEventCollector.yml @@ -76,7 +76,7 @@ script: description: Gets events from Hello World. execution: false name: hello-world-get-events - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true runonce: false script: '-' diff --git a/Packs/HelloWorld/ReleaseNotes/3_0_13.md b/Packs/HelloWorld/ReleaseNotes/3_0_13.md new file mode 100644 index 00000000000..b92162a2f6a --- /dev/null +++ b/Packs/HelloWorld/ReleaseNotes/3_0_13.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### HelloWorld + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### HelloWorld Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### HelloWorldScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/HelloWorld/Scripts/HelloWorldScript/HelloWorldScript.yml b/Packs/HelloWorld/Scripts/HelloWorldScript/HelloWorldScript.yml index a987821c681..ed48b086932 100644 --- a/Packs/HelloWorld/Scripts/HelloWorldScript/HelloWorldScript.yml +++ b/Packs/HelloWorld/Scripts/HelloWorldScript/HelloWorldScript.yml @@ -16,5 +16,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 diff --git a/Packs/HelloWorld/pack_metadata.json b/Packs/HelloWorld/pack_metadata.json index 98bd86e8faf..18a36c5c868 100644 --- a/Packs/HelloWorld/pack_metadata.json +++ b/Packs/HelloWorld/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HelloWorld", "description": "This is the Hello World integration for getting started.", "support": "community", - "currentVersion": "3.0.12", + "currentVersion": "3.0.13", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Humio/Integrations/Humio/Humio.yml b/Packs/Humio/Integrations/Humio/Humio.yml index 7243f798d72..8e22c71dbc7 100644 --- a/Packs/Humio/Integrations/Humio/Humio.yml +++ b/Packs/Humio/Integrations/Humio/Humio.yml @@ -350,7 +350,7 @@ script: description: The notifier body template type: String description: Get notifier from Humio by id - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Humio/ReleaseNotes/1_0_14.md b/Packs/Humio/ReleaseNotes/1_0_14.md new file mode 100644 index 00000000000..18610fa1eb6 --- /dev/null +++ b/Packs/Humio/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Humio + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Humio/pack_metadata.json b/Packs/Humio/pack_metadata.json index e2fe97e0475..427063d9950 100644 --- a/Packs/Humio/pack_metadata.json +++ b/Packs/Humio/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Humio", "description": "Instantly search live log data at scale. Create dashboards to visualize and analyze complex systems in real time", "support": "partner", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Humio", "url": "", "email": "integrations@humio.com", diff --git a/Packs/ILert/Integrations/ILert/ILert.yml b/Packs/ILert/Integrations/ILert/ILert.yml index 7ed806ebfbc..bb1343d49e3 100644 --- a/Packs/ILert/Integrations/ILert/ILert.yml +++ b/Packs/ILert/Integrations/ILert/ILert.yml @@ -57,7 +57,7 @@ script: name: summary description: Resolves an existing event in iLert name: ilert-resolve-event - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/ILert/ReleaseNotes/1_0_8.md b/Packs/ILert/ReleaseNotes/1_0_8.md new file mode 100644 index 00000000000..cbc3d205ed7 --- /dev/null +++ b/Packs/ILert/ReleaseNotes/1_0_8.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### iLert + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ILert/pack_metadata.json b/Packs/ILert/pack_metadata.json index 20689472984..3e4ffade0fe 100644 --- a/Packs/ILert/pack_metadata.json +++ b/Packs/ILert/pack_metadata.json @@ -2,7 +2,7 @@ "name": "iLert", "description": "iLert is an IT alerting, on-call management and uptime monitoring platform that helps DevOps teams respond to incidents faster. Use this iLert content pack to alert and notify users more efficiently.", "support": "partner", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "yacut", "url": "https://www.ilert.com/", "email": "support@ilert.com", diff --git a/Packs/IP2LocationIO/Integrations/IP2LocationIO/IP2LocationIO.yml b/Packs/IP2LocationIO/Integrations/IP2LocationIO/IP2LocationIO.yml index 395709d8038..b71b6e70167 100644 --- a/Packs/IP2LocationIO/Integrations/IP2LocationIO/IP2LocationIO.yml +++ b/Packs/IP2LocationIO/Integrations/IP2LocationIO/IP2LocationIO.yml @@ -104,7 +104,7 @@ script: - contextPath: IP.Relationships.EntityBType description: The type of the destination of the relationship. type: string - dockerimage: demisto/python3:3.10.13.82980 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/IP2LocationIO/ReleaseNotes/1_0_1.md b/Packs/IP2LocationIO/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..8a2240bd0e2 --- /dev/null +++ b/Packs/IP2LocationIO/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### IP2LocationIO + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/IP2LocationIO/pack_metadata.json b/Packs/IP2LocationIO/pack_metadata.json index fa4d97795a5..1d724c0fac3 100644 --- a/Packs/IP2LocationIO/pack_metadata.json +++ b/Packs/IP2LocationIO/pack_metadata.json @@ -2,12 +2,14 @@ "name": "IP2LocationIO", "description": "IP2Location.io API integration to query IP geolocation.", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "ip2location", "url": "https://www.ip2location.io/", "email": "support@ip2location.io", "created": "2023-12-05T03:03:31Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "githubUser": [ "ip2location" ] -} +} \ No newline at end of file diff --git a/Packs/IPQualityScore/Integrations/IPQualityScore/IPQualityScore.yml b/Packs/IPQualityScore/Integrations/IPQualityScore/IPQualityScore.yml index 79a37a91d59..b0009665421 100644 --- a/Packs/IPQualityScore/Integrations/IPQualityScore/IPQualityScore.yml +++ b/Packs/IPQualityScore/Integrations/IPQualityScore/IPQualityScore.yml @@ -397,7 +397,7 @@ script: - contextPath: URL.Malicious.Vendor description: The vendor reporting the URL as malicious. type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/IPQualityScore/ReleaseNotes/1_0_11.md b/Packs/IPQualityScore/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..e5d7021f022 --- /dev/null +++ b/Packs/IPQualityScore/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### IPQualityScore + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/IPQualityScore/pack_metadata.json b/Packs/IPQualityScore/pack_metadata.json index abd738abb7a..cd1244a0de9 100644 --- a/Packs/IPQualityScore/pack_metadata.json +++ b/Packs/IPQualityScore/pack_metadata.json @@ -2,7 +2,7 @@ "name": "IPQualityScore (IPQS) Threat Risk Scoring", "description": "Detect threats with real-time risk scoring by IPQS. Playbook analyzes IP addresses, email addresses, and domains or URLs for high risk behavior.", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "IPQualityScore", "url": "https://www.ipqualityscore.com", "email": "support@ipqualityscore.com", diff --git a/Packs/IRISDFIR/Integrations/IRISDFIR/IRISDFIR.yml b/Packs/IRISDFIR/Integrations/IRISDFIR/IRISDFIR.yml index 1af61611eb4..b84ae9b72ba 100644 --- a/Packs/IRISDFIR/Integrations/IRISDFIR/IRISDFIR.yml +++ b/Packs/IRISDFIR/Integrations/IRISDFIR/IRISDFIR.yml @@ -262,7 +262,7 @@ script: - contextPath: IRIS.ioc_type description: IoC Type. type: string - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isFetchSamples: true isfetch: true runonce: false diff --git a/Packs/IRISDFIR/ReleaseNotes/1_0_1.md b/Packs/IRISDFIR/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..3c84cabd1d8 --- /dev/null +++ b/Packs/IRISDFIR/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### IRIS DFIR + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/IRISDFIR/pack_metadata.json b/Packs/IRISDFIR/pack_metadata.json index 2d4885ae456..77b733e801c 100644 --- a/Packs/IRISDFIR/pack_metadata.json +++ b/Packs/IRISDFIR/pack_metadata.json @@ -2,12 +2,14 @@ "name": "IRIS DFIR", "description": "IRIS is a collaborative platform aiming to help incident responders to share technical details during investigations.", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Fabio Dias", "url": "", "email": "fabio.dias@ext.ec.europa.eu", "created": "2023-07-20T12:59:36Z", - "categories": ["Case Management"], + "categories": [ + "Case Management" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "githubUser": [ "Enigmatyk" ] -} +} \ No newline at end of file diff --git a/Packs/IllusiveNetworks/Integrations/IllusiveNetworks/IllusiveNetworks.yml b/Packs/IllusiveNetworks/Integrations/IllusiveNetworks/IllusiveNetworks.yml index 88c2081158b..3a45fab9a30 100644 --- a/Packs/IllusiveNetworks/Integrations/IllusiveNetworks/IllusiveNetworks.yml +++ b/Packs/IllusiveNetworks/Integrations/IllusiveNetworks/IllusiveNetworks.yml @@ -495,7 +495,7 @@ script: required: true description: Retrieve forensics artifacts from Illusive's forensics. name: illusive-get-forensics-artifacts - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/IllusiveNetworks/ReleaseNotes/1_0_32.md b/Packs/IllusiveNetworks/ReleaseNotes/1_0_32.md new file mode 100644 index 00000000000..151d8a42bba --- /dev/null +++ b/Packs/IllusiveNetworks/ReleaseNotes/1_0_32.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### IllusiveNetworks +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/IllusiveNetworks/pack_metadata.json b/Packs/IllusiveNetworks/pack_metadata.json index 8bf05fb0214..b163295376b 100644 --- a/Packs/IllusiveNetworks/pack_metadata.json +++ b/Packs/IllusiveNetworks/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Illusive Networks", "description": "Enrich SOC incident triage and investigation data with valuable Illusive information and forensics, and manage the way Illusive deploys deceptions across the network.", "support": "partner", - "currentVersion": "1.0.31", + "currentVersion": "1.0.32", "author": "Illusive Networks", "url": "https://www.illusivenetworks.com", "email": "support@illusivenetworks.com", diff --git a/Packs/Indeni/Integrations/Indeni/Indeni.yml b/Packs/Indeni/Integrations/Indeni/Indeni.yml index a63fae49b11..5ab8748a7d4 100644 --- a/Packs/Indeni/Integrations/Indeni/Indeni.yml +++ b/Packs/Indeni/Integrations/Indeni/Indeni.yml @@ -154,7 +154,7 @@ script: - contextPath: Indeni.AlertInfo.Note description: Notes for the given issue. type: Unknown - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true longRunning: true runonce: false diff --git a/Packs/Indeni/ReleaseNotes/1_0_14.md b/Packs/Indeni/ReleaseNotes/1_0_14.md new file mode 100644 index 00000000000..c0f4fb8f50f --- /dev/null +++ b/Packs/Indeni/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Indeni + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Indeni/pack_metadata.json b/Packs/Indeni/pack_metadata.json index fe996011a3b..218d7abc8f9 100644 --- a/Packs/Indeni/pack_metadata.json +++ b/Packs/Indeni/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Indeni", "description": "Indeni is a turn-key automated monitoring providing visibility for security infrastructure. Indeni's production-ready Knowledge is curated from vetted, community-sourced experience, to deliver automation of tedious tasks with integration with your existing processes.\ndisplay: Indeni", "support": "partner", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Indeni", "url": "", "email": "support@indeni.com", diff --git a/Packs/Inventa/Integrations/Inventa/Inventa.yml b/Packs/Inventa/Integrations/Inventa/Inventa.yml index c6c676c06fb..11b079cc183 100644 --- a/Packs/Inventa/Integrations/Inventa/Inventa.yml +++ b/Packs/Inventa/Integrations/Inventa/Inventa.yml @@ -293,7 +293,7 @@ script: - contextPath: Inventa.DataSubjects.Ticket.ticket_id description: ID of a DSAR ticket, created within Inventa. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Inventa/ReleaseNotes/1_1_12.md b/Packs/Inventa/ReleaseNotes/1_1_12.md new file mode 100644 index 00000000000..3cacdaa4820 --- /dev/null +++ b/Packs/Inventa/ReleaseNotes/1_1_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### 1Touch.io's Inventa Connector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Inventa/pack_metadata.json b/Packs/Inventa/pack_metadata.json index 8f9717d9b2c..2f3d500b917 100644 --- a/Packs/Inventa/pack_metadata.json +++ b/Packs/Inventa/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Inventa", "description": "Handling DSAR reporting within Inventa Instance, including PII categories found, storages with data related to the PII etc.", "support": "partner", - "currentVersion": "1.1.11", + "currentVersion": "1.1.12", "author": "1Touch.io", "url": "1Touch.io", "email": "", diff --git a/Packs/IronDefense/Integrations/IronDefense/IronDefense.yml b/Packs/IronDefense/Integrations/IronDefense/IronDefense.yml index 9005f973c54..096036fc32c 100644 --- a/Packs/IronDefense/Integrations/IronDefense/IronDefense.yml +++ b/Packs/IronDefense/Integrations/IronDefense/IronDefense.yml @@ -789,7 +789,7 @@ script: - contextPath: IronDefense.Query.GetEvents.total description: The total number of results possible from the query. type: Number - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/IronDefense/ReleaseNotes/1_1_31.md b/Packs/IronDefense/ReleaseNotes/1_1_31.md new file mode 100644 index 00000000000..f4ea734e60f --- /dev/null +++ b/Packs/IronDefense/ReleaseNotes/1_1_31.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### IronDefense + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/IronDefense/pack_metadata.json b/Packs/IronDefense/pack_metadata.json index 92237911f02..95f6905c59c 100644 --- a/Packs/IronDefense/pack_metadata.json +++ b/Packs/IronDefense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "IronNet", "description": "The IronDefense Integration allows users to interact with IronDefense alerts within Demisto. The Integration provides the ability to rate alerts, update alert statuses, add comments to alerts, and to report observed bad activity.", "support": "partner", - "currentVersion": "1.1.30", + "currentVersion": "1.1.31", "author": "Iron Defense", "url": "https://ironnet.atlassian.net/servicedesk/customer/portal/4", "email": "support@ironnetcybersecurity.com", diff --git a/Packs/Ironscales/ReleaseNotes/1_1_14.md b/Packs/Ironscales/ReleaseNotes/1_1_14.md new file mode 100644 index 00000000000..21af53fca52 --- /dev/null +++ b/Packs/Ironscales/ReleaseNotes/1_1_14.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### IronscalesEmailFieldTrigger + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Ironscales/Scripts/IronscalesEmailFieldTrigger/IronscalesEmailFieldTrigger.yml b/Packs/Ironscales/Scripts/IronscalesEmailFieldTrigger/IronscalesEmailFieldTrigger.yml index c1e47459988..4cab939ce88 100644 --- a/Packs/Ironscales/Scripts/IronscalesEmailFieldTrigger/IronscalesEmailFieldTrigger.yml +++ b/Packs/Ironscales/Scripts/IronscalesEmailFieldTrigger/IronscalesEmailFieldTrigger.yml @@ -11,7 +11,7 @@ fromversion: 6.0.0 enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/Ironscales/pack_metadata.json b/Packs/Ironscales/pack_metadata.json index 76ac4e43683..84b7f91aaa1 100644 --- a/Packs/Ironscales/pack_metadata.json +++ b/Packs/Ironscales/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ironscales", "description": "IRONSCALES is a self-learning email security platform, automatically responding to malicious emails.", "support": "partner", - "currentVersion": "1.1.13", + "currentVersion": "1.1.14", "author": "Ironscales", "url": "", "email": "support@ironscales.com", diff --git a/Packs/Jizo_M/Integrations/JizoM/JizoM.yml b/Packs/Jizo_M/Integrations/JizoM/JizoM.yml index 22db63443cf..0ce371146cf 100644 --- a/Packs/Jizo_M/Integrations/JizoM/JizoM.yml +++ b/Packs/Jizo_M/Integrations/JizoM/JizoM.yml @@ -269,7 +269,7 @@ script: description: The total number of alerts. type: Number description: Retrieve all information available on Jizo M, mainly alerts. - dockerimage: demisto/python3:3.10.14.97608 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Jizo_M/ReleaseNotes/1_0_1.md b/Packs/Jizo_M/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..17bbbfb60a5 --- /dev/null +++ b/Packs/Jizo_M/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### JizoM + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Jizo_M/pack_metadata.json b/Packs/Jizo_M/pack_metadata.json index b32a90d58ec..507138e9625 100644 --- a/Packs/Jizo_M/pack_metadata.json +++ b/Packs/Jizo_M/pack_metadata.json @@ -2,16 +2,23 @@ "name": "JizoM", "description": "This integration ensures interaction with the Jizo Manager API", "support": "partner", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "SesameIT", "url": "https://sesame-it.com/", "email": "support@sesame-it.com", "categories": [ "Network Security" ], - "tags": ["Alerts", "Security"], - "useCases": ["Network Security"], - "keywords": ["Jizo"], + "tags": [ + "Alerts", + "Security" + ], + "useCases": [ + "Network Security" + ], + "keywords": [ + "Jizo" + ], "marketplaces": [ "xsoar" ], diff --git a/Packs/KELARaDark/Integrations/RaDark/RaDark.yml b/Packs/KELARaDark/Integrations/RaDark/RaDark.yml index 888c13a2b76..dda0d849bbf 100644 --- a/Packs/KELARaDark/Integrations/RaDark/RaDark.yml +++ b/Packs/KELARaDark/Integrations/RaDark/RaDark.yml @@ -213,7 +213,7 @@ script: required: true description: Request to purchase an item offered for sale on an automated store. name: radark-item-purchase - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/KELARaDark/ReleaseNotes/1_1_7.md b/Packs/KELARaDark/ReleaseNotes/1_1_7.md new file mode 100644 index 00000000000..ca25f220c92 --- /dev/null +++ b/Packs/KELARaDark/ReleaseNotes/1_1_7.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### RaDark + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### MapRaDarkIncidentDetails + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/KELARaDark/Scripts/MapRaDarkIncidentDetails/MapRaDarkIncidentDetails.yml b/Packs/KELARaDark/Scripts/MapRaDarkIncidentDetails/MapRaDarkIncidentDetails.yml index 4a1169ce302..22e07828baf 100644 --- a/Packs/KELARaDark/Scripts/MapRaDarkIncidentDetails/MapRaDarkIncidentDetails.yml +++ b/Packs/KELARaDark/Scripts/MapRaDarkIncidentDetails/MapRaDarkIncidentDetails.yml @@ -5,7 +5,7 @@ comment: Map details to an RaDark incident. commonfields: id: MapRaDarkIncidentDetails version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: MapRaDarkIncidentDetails outputs: diff --git a/Packs/KELARaDark/pack_metadata.json b/Packs/KELARaDark/pack_metadata.json index 64230530a6f..14f7b0ccabf 100644 --- a/Packs/KELARaDark/pack_metadata.json +++ b/Packs/KELARaDark/pack_metadata.json @@ -2,7 +2,7 @@ "name": "KELA RaDark", "description": "This content pack enables you to fetch incidents and manage your RaDark monitor from Cortex XSOAR.", "support": "partner", - "currentVersion": "1.1.6", + "currentVersion": "1.1.7", "author": "KELA", "url": "ke-la.com", "email": "support@ke-la.com", diff --git a/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSAT/KnowBe4KMSAT.yml b/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSAT/KnowBe4KMSAT.yml index b4e6a1ceaf8..1d9a5792586 100644 --- a/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSAT/KnowBe4KMSAT.yml +++ b/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSAT/KnowBe4KMSAT.yml @@ -1021,7 +1021,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - No tests (auto formatted) diff --git a/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_35.md b/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_35.md new file mode 100644 index 00000000000..2ee6cab300e --- /dev/null +++ b/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_35.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### KnowBe4KMSAT + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/KnowBe4_KMSAT/pack_metadata.json b/Packs/KnowBe4_KMSAT/pack_metadata.json index 7941dba9c14..ab5b78e0b39 100644 --- a/Packs/KnowBe4_KMSAT/pack_metadata.json +++ b/Packs/KnowBe4_KMSAT/pack_metadata.json @@ -2,7 +2,7 @@ "name": "KMSAT", "description": "KnowBe4 KMSAT Integration", "support": "partner", - "currentVersion": "1.0.34", + "currentVersion": "1.0.35", "author": "KnowBe4", "url": "https://www.knowbe4.com/products/kevin-mitnick-security-awareness-training", "email": "support@knowbe4.com", diff --git a/Packs/Lansweeper/Integrations/Lansweeper/Lansweeper.yml b/Packs/Lansweeper/Integrations/Lansweeper/Lansweeper.yml index 29c5392689e..97aedd93935 100644 --- a/Packs/Lansweeper/Integrations/Lansweeper/Lansweeper.yml +++ b/Packs/Lansweeper/Integrations/Lansweeper/Lansweeper.yml @@ -242,7 +242,7 @@ script: - contextPath: Lansweeper.Mac.siteName description: The name of the site to which the asset belongs. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Lansweeper/ReleaseNotes/1_0_10.md b/Packs/Lansweeper/ReleaseNotes/1_0_10.md new file mode 100644 index 00000000000..3172bbdaa0d --- /dev/null +++ b/Packs/Lansweeper/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Lansweeper + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Lansweeper/pack_metadata.json b/Packs/Lansweeper/pack_metadata.json index 35f623f6269..17ad74d3f75 100644 --- a/Packs/Lansweeper/pack_metadata.json +++ b/Packs/Lansweeper/pack_metadata.json @@ -1,8 +1,8 @@ { "name": "Lansweeper", - "description": "Lansweeper content pack allows users to search specific assets, providing detailed information about each asset such as it\u2019s type, operating system, serial number and much more contextual information.", + "description": "Lansweeper content pack allows users to search specific assets, providing detailed information about each asset such as it’s type, operating system, serial number and much more contextual information.", "support": "partner", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Lansweeper", "url": "https://www.lansweeper.com/contact-support/", "email": "", diff --git a/Packs/Linkshadow/Integrations/Linkshadow/Linkshadow.yml b/Packs/Linkshadow/Integrations/Linkshadow/Linkshadow.yml index b7f3db77a1a..ef365355320 100644 --- a/Packs/Linkshadow/Integrations/Linkshadow/Linkshadow.yml +++ b/Packs/Linkshadow/Integrations/Linkshadow/Linkshadow.yml @@ -124,7 +124,7 @@ script: description: Time of Anomaly seen type: date description: Return the full entity details for all devices referenced by data in an API response. Use of this command will return the JSON structure of the API response . - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '-' subtype: python3 diff --git a/Packs/Linkshadow/ReleaseNotes/1_0_8.md b/Packs/Linkshadow/ReleaseNotes/1_0_8.md new file mode 100644 index 00000000000..85337edf521 --- /dev/null +++ b/Packs/Linkshadow/ReleaseNotes/1_0_8.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Linkshadow + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Linkshadow/pack_metadata.json b/Packs/Linkshadow/pack_metadata.json index ef9572809fc..f4c74433b56 100644 --- a/Packs/Linkshadow/pack_metadata.json +++ b/Packs/Linkshadow/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Linkshadow", "description": "Fetch Network Anomalies data from LinkShadow and execute the remediation Actions.", "support": "partner", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "Linkshadow", "url": "https://www.linkshadow.com/account/login", "email": "support@linkshadow.com", diff --git a/Packs/LogPoint_SIEM_Integration/Integrations/LogPoint_SIEM_Integration/LogPoint_SIEM_Integration.yml b/Packs/LogPoint_SIEM_Integration/Integrations/LogPoint_SIEM_Integration/LogPoint_SIEM_Integration.yml index 78f124419a9..5828adeb591 100644 --- a/Packs/LogPoint_SIEM_Integration/Integrations/LogPoint_SIEM_Integration/LogPoint_SIEM_Integration.yml +++ b/Packs/LogPoint_SIEM_Integration/Integrations/LogPoint_SIEM_Integration/LogPoint_SIEM_Integration.yml @@ -733,7 +733,7 @@ script: - contextPath: LogPoint.SearchLogs description: Search results. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '' diff --git a/Packs/LogPoint_SIEM_Integration/ReleaseNotes/1_2_12.md b/Packs/LogPoint_SIEM_Integration/ReleaseNotes/1_2_12.md new file mode 100644 index 00000000000..0663e51756b --- /dev/null +++ b/Packs/LogPoint_SIEM_Integration/ReleaseNotes/1_2_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### LogPoint SIEM Integration + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/LogPoint_SIEM_Integration/pack_metadata.json b/Packs/LogPoint_SIEM_Integration/pack_metadata.json index 41964810f23..dc92ecee4ae 100644 --- a/Packs/LogPoint_SIEM_Integration/pack_metadata.json +++ b/Packs/LogPoint_SIEM_Integration/pack_metadata.json @@ -2,7 +2,7 @@ "name": "LogPoint SIEM Integration", "description": "Use this Content Pack to fetch incident logs from LogPoint, analyze them for underlying threats, and respond to these threats in real-time.", "support": "partner", - "currentVersion": "1.2.11", + "currentVersion": "1.2.12", "author": "LogPoint", "authorImage": "content/Packs/LogPoint_SIEM_Integration/doc_files/LogPoint_image.png", "url": "https://servicedesk.logpoint.com", diff --git a/Packs/LogsignSiem/Integrations/LogsignSiem/LogsignSiem.yml b/Packs/LogsignSiem/Integrations/LogsignSiem/LogsignSiem.yml index 4246c06e548..1db3dcdcaa2 100644 --- a/Packs/LogsignSiem/Integrations/LogsignSiem/LogsignSiem.yml +++ b/Packs/LogsignSiem/Integrations/LogsignSiem/LogsignSiem.yml @@ -98,7 +98,7 @@ script: - contextPath: LogsignSiem.Count description: Count number returned as the result of the query. type: Number - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/LogsignSiem/ReleaseNotes/1_0_14.md b/Packs/LogsignSiem/ReleaseNotes/1_0_14.md new file mode 100644 index 00000000000..fcdfdf40177 --- /dev/null +++ b/Packs/LogsignSiem/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### LogsignSiem + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/LogsignSiem/pack_metadata.json b/Packs/LogsignSiem/pack_metadata.json index bc1cd58de7c..7b2a4a4245b 100644 --- a/Packs/LogsignSiem/pack_metadata.json +++ b/Packs/LogsignSiem/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Logsign SIEM", "description": "Logsign SIEM provides to collect and store unlimited data, investigate and detect threats, and respond automatically.", "support": "partner", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Logsign", "url": " https://support.logsign.net/", "email": "support@logsign.net", diff --git a/Packs/Logzio/Integrations/Logzio/Logzio.yml b/Packs/Logzio/Integrations/Logzio/Logzio.yml index b9fd005882e..2e85233b904 100644 --- a/Packs/Logzio/Integrations/Logzio/Logzio.yml +++ b/Packs/Logzio/Integrations/Logzio/Logzio.yml @@ -120,7 +120,7 @@ script: description: The log's timestamp. type: date description: Fetches the logs that triggered a security event in Logz.io Cloud SIEM. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Logzio/ReleaseNotes/1_1_20.md b/Packs/Logzio/ReleaseNotes/1_1_20.md new file mode 100644 index 00000000000..e35f11e1d90 --- /dev/null +++ b/Packs/Logzio/ReleaseNotes/1_1_20.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Logz.io + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Logzio/pack_metadata.json b/Packs/Logzio/pack_metadata.json index 71ab5462a19..4f7295cd6d0 100644 --- a/Packs/Logzio/pack_metadata.json +++ b/Packs/Logzio/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Logz.io", "description": "Logz.io Package to fetch alerts from logz.io and threat hunting", "support": "partner", - "currentVersion": "1.1.19", + "currentVersion": "1.1.20", "author": "Logz.io", "url": "", "email": "support@logz.io", diff --git a/Packs/MailSenderNew/Integrations/MailSenderNew/MailSenderNew.yml b/Packs/MailSenderNew/Integrations/MailSenderNew/MailSenderNew.yml index aadbf1ea50c..0a5d4d84a06 100644 --- a/Packs/MailSenderNew/Integrations/MailSenderNew/MailSenderNew.yml +++ b/Packs/MailSenderNew/Integrations/MailSenderNew/MailSenderNew.yml @@ -109,7 +109,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 tests: - Mail Sender (New) Test fromversion: 5.0.0 diff --git a/Packs/MailSenderNew/ReleaseNotes/1_0_28.md b/Packs/MailSenderNew/ReleaseNotes/1_0_28.md new file mode 100644 index 00000000000..a04502ada62 --- /dev/null +++ b/Packs/MailSenderNew/ReleaseNotes/1_0_28.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Mail Sender (New) + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/MailSenderNew/pack_metadata.json b/Packs/MailSenderNew/pack_metadata.json index 592a5261363..1d5b41063ba 100644 --- a/Packs/MailSenderNew/pack_metadata.json +++ b/Packs/MailSenderNew/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Mail Sender (New)", "description": "Send emails implemented in Python with embedded image support", "support": "xsoar", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ManageEngine_PAM360/Integrations/ManageEnginePAM360/ManageEnginePAM360.yml b/Packs/ManageEngine_PAM360/Integrations/ManageEnginePAM360/ManageEnginePAM360.yml index 055b02de83e..ca7fe1fa7ca 100644 --- a/Packs/ManageEngine_PAM360/Integrations/ManageEnginePAM360/ManageEnginePAM360.yml +++ b/Packs/ManageEngine_PAM360/Integrations/ManageEnginePAM360/ManageEnginePAM360.yml @@ -358,7 +358,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/ManageEngine_PAM360/ReleaseNotes/1_0_16.md b/Packs/ManageEngine_PAM360/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..06f69ceafaa --- /dev/null +++ b/Packs/ManageEngine_PAM360/ReleaseNotes/1_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ManageEngine PAM360 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ManageEngine_PAM360/pack_metadata.json b/Packs/ManageEngine_PAM360/pack_metadata.json index 80903d9249c..80f1f3200f7 100644 --- a/Packs/ManageEngine_PAM360/pack_metadata.json +++ b/Packs/ManageEngine_PAM360/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ManageEngine_PAM360", "description": "PAM360 integrates with Cortex XSOAR that fetches passwords directly from the PAM360 vault to use in their tasks.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "ManageEngine PAM360", "url": "https://www.manageengine.com/privileged-access-management/support.html", "email": "pam360-support@manageengine.com", diff --git a/Packs/MandiantAdvantageAttackSurfaceManagement/Integrations/AttackSurfaceManagement/AttackSurfaceManagement.yml b/Packs/MandiantAdvantageAttackSurfaceManagement/Integrations/AttackSurfaceManagement/AttackSurfaceManagement.yml index 7ce5230deca..43b78dfba24 100644 --- a/Packs/MandiantAdvantageAttackSurfaceManagement/Integrations/AttackSurfaceManagement/AttackSurfaceManagement.yml +++ b/Packs/MandiantAdvantageAttackSurfaceManagement/Integrations/AttackSurfaceManagement/AttackSurfaceManagement.yml @@ -114,7 +114,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 fromversion: "6.8.0" tests: - No tests (auto formatted) diff --git a/Packs/MandiantAdvantageAttackSurfaceManagement/ReleaseNotes/1_0_6.md b/Packs/MandiantAdvantageAttackSurfaceManagement/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..0f9dd9381a6 --- /dev/null +++ b/Packs/MandiantAdvantageAttackSurfaceManagement/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Mandiant Attack Surface Management + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/MandiantAdvantageAttackSurfaceManagement/pack_metadata.json b/Packs/MandiantAdvantageAttackSurfaceManagement/pack_metadata.json index f8d49f321b9..73ea06ffd72 100644 --- a/Packs/MandiantAdvantageAttackSurfaceManagement/pack_metadata.json +++ b/Packs/MandiantAdvantageAttackSurfaceManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Mandiant Advantage Attack Surface Management", "description": "Centralize and manage remediation efforts for security issues identified from the external attack surface.", "support": "partner", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Mandiant", "url": "https://www.mandiant.com/support", "email": "customersupport@mandiant.com", diff --git a/Packs/MandiantAdvantageThreatIntelligence/Integrations/MandiantAdvantageThreatIntelligence/MandiantAdvantageThreatIntelligence.yml b/Packs/MandiantAdvantageThreatIntelligence/Integrations/MandiantAdvantageThreatIntelligence/MandiantAdvantageThreatIntelligence.yml index 75bea24472c..0bd24782868 100644 --- a/Packs/MandiantAdvantageThreatIntelligence/Integrations/MandiantAdvantageThreatIntelligence/MandiantAdvantageThreatIntelligence.yml +++ b/Packs/MandiantAdvantageThreatIntelligence/Integrations/MandiantAdvantageThreatIntelligence/MandiantAdvantageThreatIntelligence.yml @@ -485,7 +485,7 @@ script: - Actors required: true description: Get Mandiant Indicators. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/MandiantAdvantageThreatIntelligence/ReleaseNotes/1_1_3.md b/Packs/MandiantAdvantageThreatIntelligence/ReleaseNotes/1_1_3.md new file mode 100644 index 00000000000..bb83db08b1d --- /dev/null +++ b/Packs/MandiantAdvantageThreatIntelligence/ReleaseNotes/1_1_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Mandiant Advantage Threat Intelligence + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/MandiantAdvantageThreatIntelligence/pack_metadata.json b/Packs/MandiantAdvantageThreatIntelligence/pack_metadata.json index 9d9f398b4f3..60d0665e468 100644 --- a/Packs/MandiantAdvantageThreatIntelligence/pack_metadata.json +++ b/Packs/MandiantAdvantageThreatIntelligence/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Mandiant Advantage Threat Intelligence", "description": "Integrate your Mandiant Advantage Threat Intelligence data with Cortex XSOAR", "support": "partner", - "currentVersion": "1.1.2", + "currentVersion": "1.1.3", "author": "Mandiant", "hidden": false, "url": "https://www.mandiant.com/support", diff --git a/Packs/MobileIronUEM/Integrations/MobileIronCLOUD/MobileIronCLOUD.yml b/Packs/MobileIronUEM/Integrations/MobileIronCLOUD/MobileIronCLOUD.yml index 9ad54f1d355..85c7bf06772 100644 --- a/Packs/MobileIronUEM/Integrations/MobileIronCLOUD/MobileIronCLOUD.yml +++ b/Packs/MobileIronUEM/Integrations/MobileIronCLOUD/MobileIronCLOUD.yml @@ -470,7 +470,7 @@ script: - contextPath: MobileIronCloud.Device.jailbroken description: Whether the device is jailbroken. type: Boolean - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/MobileIronUEM/Integrations/MobileIronCORE/MobileIronCORE.yml b/Packs/MobileIronUEM/Integrations/MobileIronCORE/MobileIronCORE.yml index 4bcb0a4ad2c..c2cb07a41fc 100644 --- a/Packs/MobileIronUEM/Integrations/MobileIronCORE/MobileIronCORE.yml +++ b/Packs/MobileIronUEM/Integrations/MobileIronCORE/MobileIronCORE.yml @@ -664,7 +664,7 @@ script: - contextPath: MobileIronCore.Device.common_mdm_managed description: Whether the device that was fetched is MDM managed. type: Boolean - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/MobileIronUEM/ReleaseNotes/1_0_17.md b/Packs/MobileIronUEM/ReleaseNotes/1_0_17.md new file mode 100644 index 00000000000..917cee423f3 --- /dev/null +++ b/Packs/MobileIronUEM/ReleaseNotes/1_0_17.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### MobileIronCLOUD + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### MobileIronCORE + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/MobileIronUEM/pack_metadata.json b/Packs/MobileIronUEM/pack_metadata.json index f9a960e3dda..047682b4f1c 100644 --- a/Packs/MobileIronUEM/pack_metadata.json +++ b/Packs/MobileIronUEM/pack_metadata.json @@ -3,7 +3,7 @@ "description": "This MobileIron UEM Content Pack enables fetching device data and incidents from both MobileIron Core and Cloud. The integration, apart from providing custom commands helpful when doing data enrichment, includes sample playbooks and an incident layout to help analyst investigations", "support": "partner", "certification": "certified", - "currentVersion": "1.0.16", + "currentVersion": "1.0.17", "author": "MobileIron Inc.", "url": "https://mobileiron.com", "email": "ecosystem@mobileiron.com", diff --git a/Packs/Ncurion/Integrations/Ncurion/Ncurion.yml b/Packs/Ncurion/Integrations/Ncurion/Ncurion.yml index fdd2348b294..31f18a73bc4 100644 --- a/Packs/Ncurion/Integrations/Ncurion/Ncurion.yml +++ b/Packs/Ncurion/Integrations/Ncurion/Ncurion.yml @@ -53,7 +53,7 @@ script: description: Get the Ncurion Log server list. name: ncurion-get-log-list outputs: [] - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isFetchSamples: true isfetch: true script: '' diff --git a/Packs/Ncurion/ReleaseNotes/1_0_3.md b/Packs/Ncurion/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..54450ed7538 --- /dev/null +++ b/Packs/Ncurion/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Ncurion + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Ncurion/pack_metadata.json b/Packs/Ncurion/pack_metadata.json index 6e499056ef4..2fcf1ce655e 100644 --- a/Packs/Ncurion/pack_metadata.json +++ b/Packs/Ncurion/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ncurion", "description": "Ncurion is a container-based, standardized detection engine that protects the nature of intrusion detection.", "support": "partner", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Ncurity", "url": "www.ncurity.com", "email": "paloalto@ncurity.com", diff --git a/Packs/Neosec/Integrations/Neosec/Neosec.yml b/Packs/Neosec/Integrations/Neosec/Neosec.yml index 2423b378d30..de09268f8f3 100644 --- a/Packs/Neosec/Integrations/Neosec/Neosec.yml +++ b/Packs/Neosec/Integrations/Neosec/Neosec.yml @@ -115,7 +115,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 defaultmapperin: Neosec - Incoming Mapper tests: diff --git a/Packs/Neosec/ReleaseNotes/1_0_5.md b/Packs/Neosec/ReleaseNotes/1_0_5.md new file mode 100644 index 00000000000..7f6ff69a29f --- /dev/null +++ b/Packs/Neosec/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Neosec + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Neosec/pack_metadata.json b/Packs/Neosec/pack_metadata.json index 2e9209a49c8..e125e719d3d 100644 --- a/Packs/Neosec/pack_metadata.json +++ b/Packs/Neosec/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Neosec", "description": "Utilize Neosec behavioral analytics to protect your API estate from OWSP top 10 vulnerabilities and suspicious user behavior.", "support": "partner", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Neosec", "url": "", "email": "support@neosec.com", diff --git a/Packs/NetscoutAED/Integrations/NetscoutAED/NetscoutAED.yml b/Packs/NetscoutAED/Integrations/NetscoutAED/NetscoutAED.yml index 59c41b03e70..ba1a04d8ee2 100644 --- a/Packs/NetscoutAED/Integrations/NetscoutAED/NetscoutAED.yml +++ b/Packs/NetscoutAED/Integrations/NetscoutAED/NetscoutAED.yml @@ -798,7 +798,7 @@ script: required: true description: Removes one or more hosts or CIDRs from the outbound allow list. name: na-ed-outbound-whitelisted-hosts-remove - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/NetscoutAED/ReleaseNotes/1_0_27.md b/Packs/NetscoutAED/ReleaseNotes/1_0_27.md new file mode 100644 index 00000000000..f8eea2898c8 --- /dev/null +++ b/Packs/NetscoutAED/ReleaseNotes/1_0_27.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Netscout Arbor Edge Defense + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/NetscoutAED/pack_metadata.json b/Packs/NetscoutAED/pack_metadata.json index c026c49bb67..87beae50e2f 100644 --- a/Packs/NetscoutAED/pack_metadata.json +++ b/Packs/NetscoutAED/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Netscout Arbor Edge Defense - AED", "description": "Use the Netscout Arbor Edge Defense integration to detect and stop both inbound threats and outbound malicious communication from compromised internal devices.", "support": "partner", - "currentVersion": "1.0.26", + "currentVersion": "1.0.27", "author": "Netscout", "url": "https://www.netscout.com/product/arbor-aed-aem", "email": "supportmanagement@netscout.com", @@ -16,4 +16,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/NetskopeV2/Integrations/NetskopeV2/NetskopeV2.yml b/Packs/NetskopeV2/Integrations/NetskopeV2/NetskopeV2.yml index 88672ac39fe..fbe65e027f7 100644 --- a/Packs/NetskopeV2/Integrations/NetskopeV2/NetskopeV2.yml +++ b/Packs/NetskopeV2/Integrations/NetskopeV2/NetskopeV2.yml @@ -163,7 +163,7 @@ script: - contextPath: Netskope.List.pending description: URL List pending status ('1' if pending, '0' if not). type: number - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/NetskopeV2/ReleaseNotes/1_0_4.md b/Packs/NetskopeV2/ReleaseNotes/1_0_4.md new file mode 100644 index 00000000000..d1fe7b31295 --- /dev/null +++ b/Packs/NetskopeV2/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Netskope (API v2) + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/NetskopeV2/pack_metadata.json b/Packs/NetskopeV2/pack_metadata.json index 71973cc8d55..d6832e12704 100644 --- a/Packs/NetskopeV2/pack_metadata.json +++ b/Packs/NetskopeV2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Netskope v2", "description": "Block URLs, domains and file hashes.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "randomizerxd", "url": "", "email": "", diff --git a/Packs/Ollama/Integrations/Ollama/Ollama.yml b/Packs/Ollama/Integrations/Ollama/Ollama.yml index 1fa65460f4d..b5e70e481f3 100644 --- a/Packs/Ollama/Integrations/Ollama/Ollama.yml +++ b/Packs/Ollama/Integrations/Ollama/Ollama.yml @@ -129,7 +129,7 @@ script: outputs: - contextPath: ollama.generate description: Output of the command. - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Ollama/ReleaseNotes/1_0_1.md b/Packs/Ollama/ReleaseNotes/1_0_1.md new file mode 100644 index 00000000000..d36ed520193 --- /dev/null +++ b/Packs/Ollama/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Ollama + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Ollama/pack_metadata.json b/Packs/Ollama/pack_metadata.json index abf6008b6ee..e93b43bd480 100644 --- a/Packs/Ollama/pack_metadata.json +++ b/Packs/Ollama/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ollama", "description": "Get up and running with large language models locally.", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Ryan Fortress", "url": "", "email": "", diff --git a/Packs/Orca/Integrations/Orca/Orca.yml b/Packs/Orca/Integrations/Orca/Orca.yml index 8214a2c2d7d..d7a2386a928 100644 --- a/Packs/Orca/Integrations/Orca/Orca.yml +++ b/Packs/Orca/Integrations/Orca/Orca.yml @@ -195,7 +195,7 @@ script: description: Basic information of the file type: string description: Downloads a capture file from CS Enterprise. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml b/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml index e96ede0c739..535ec2281df 100644 --- a/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml +++ b/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml @@ -58,7 +58,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: '6.8.0' supportlevelheader: xsoar marketplaces: diff --git a/Packs/Orca/ReleaseNotes/2_2_11.md b/Packs/Orca/ReleaseNotes/2_2_11.md new file mode 100644 index 00000000000..130f2f3873f --- /dev/null +++ b/Packs/Orca/ReleaseNotes/2_2_11.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Orca Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### Orca +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Orca/pack_metadata.json b/Packs/Orca/pack_metadata.json index ae327e02d44..d663f410e71 100644 --- a/Packs/Orca/pack_metadata.json +++ b/Packs/Orca/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Orca", "description": "Integrate with Orca security for bidirectional incident management and fetching of asset information. \n", "support": "partner", - "currentVersion": "2.2.10", + "currentVersion": "2.2.11", "author": "Orca Security", "url": "https://orca.security/", "email": "support@orca.security", diff --git a/Packs/PANOSPolicyOptimizer/Integrations/PANOSPolicyOptimizer/PANOSPolicyOptimizer.yml b/Packs/PANOSPolicyOptimizer/Integrations/PANOSPolicyOptimizer/PANOSPolicyOptimizer.yml index 029537f419a..63a3b6f5ef0 100644 --- a/Packs/PANOSPolicyOptimizer/Integrations/PANOSPolicyOptimizer/PANOSPolicyOptimizer.yml +++ b/Packs/PANOSPolicyOptimizer/Integrations/PANOSPolicyOptimizer/PANOSPolicyOptimizer.yml @@ -181,7 +181,7 @@ script: name: device_group description: Gets a specific dynamic address group. name: pan-os-get-dag - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_29.md b/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_29.md new file mode 100644 index 00000000000..45995a76f6d --- /dev/null +++ b/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_29.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### PAN-OS Policy Optimizer (Beta) + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/PANOSPolicyOptimizer/pack_metadata.json b/Packs/PANOSPolicyOptimizer/pack_metadata.json index f15501889ab..d8291cac2ce 100644 --- a/Packs/PANOSPolicyOptimizer/pack_metadata.json +++ b/Packs/PANOSPolicyOptimizer/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PAN-OS Policy Optimizer (beta)", "description": "This integration introduces Policy Optimizer and DAG features that are not available through the regular PAN API", "support": "community", - "currentVersion": "1.1.28", + "currentVersion": "1.1.29", "author": "Maciej Drobniuch and Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/PassiveTotal/Integrations/PassiveTotal_v2/PassiveTotal_v2.yml b/Packs/PassiveTotal/Integrations/PassiveTotal_v2/PassiveTotal_v2.yml index ef05b47d5aa..7a4d138d831 100644 --- a/Packs/PassiveTotal/Integrations/PassiveTotal_v2/PassiveTotal_v2.yml +++ b/Packs/PassiveTotal/Integrations/PassiveTotal_v2/PassiveTotal_v2.yml @@ -2293,7 +2293,7 @@ script: - contextPath: PassiveTotal.Summary.ThirdPartyObservation.nextPage description: Link to the next page. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/PassiveTotal/ReleaseNotes/2_1_17.md b/Packs/PassiveTotal/ReleaseNotes/2_1_17.md new file mode 100644 index 00000000000..d8b91146c78 --- /dev/null +++ b/Packs/PassiveTotal/ReleaseNotes/2_1_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### PassiveTotal v2 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/PassiveTotal/pack_metadata.json b/Packs/PassiveTotal/pack_metadata.json index 0b52ad60e5b..36cb6810016 100644 --- a/Packs/PassiveTotal/pack_metadata.json +++ b/Packs/PassiveTotal/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PassiveTotal", "description": "Analyze and understand threat infrastructure from a variety of sources–passive DNS, active DNS, WHOIS, SSL certificates and more–without devoting resources to time-intensive manual threat research and analysis", "support": "community", - "currentVersion": "2.1.16", + "currentVersion": "2.1.17", "author": "RiskIQ", "url": "https://www.riskiq.com/resources/support/", "email": "paloaltonetworks@riskiq.net", diff --git a/Packs/Pcysys/ReleaseNotes/1_3_10.md b/Packs/Pcysys/ReleaseNotes/1_3_10.md new file mode 100644 index 00000000000..536670c51d6 --- /dev/null +++ b/Packs/Pcysys/ReleaseNotes/1_3_10.md @@ -0,0 +1,9 @@ + +#### Scripts + +##### PenteraDynamicTable + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### PenteraOperationToIncident + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Pcysys/Scripts/PenteraDynamicTable/PenteraDynamicTable.yml b/Packs/Pcysys/Scripts/PenteraDynamicTable/PenteraDynamicTable.yml index 450d6a01057..5d59ab8ffb5 100644 --- a/Packs/Pcysys/Scripts/PenteraDynamicTable/PenteraDynamicTable.yml +++ b/Packs/Pcysys/Scripts/PenteraDynamicTable/PenteraDynamicTable.yml @@ -9,7 +9,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole comment: Renders a Markdown Table from penteraoperationdetails field in Pentera Insight incidents fromversion: 5.0.0 diff --git a/Packs/Pcysys/Scripts/PenteraOperationToIncident/PenteraOperationToIncident.yml b/Packs/Pcysys/Scripts/PenteraOperationToIncident/PenteraOperationToIncident.yml index ee7c277c181..0506d52b087 100644 --- a/Packs/Pcysys/Scripts/PenteraOperationToIncident/PenteraOperationToIncident.yml +++ b/Packs/Pcysys/Scripts/PenteraOperationToIncident/PenteraOperationToIncident.yml @@ -22,7 +22,7 @@ outputs: type: unknown scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole comment: Groups Pentera Full Actions Reports by Operation Type to generate an output usable in creating incidents fromversion: 5.0.0 diff --git a/Packs/Pcysys/pack_metadata.json b/Packs/Pcysys/pack_metadata.json index 46292ebb47e..ec5a935c553 100644 --- a/Packs/Pcysys/pack_metadata.json +++ b/Packs/Pcysys/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Pentera", "description": "Automate remediation actions based on Pentera, the Automated Security Validation Platform, proactively exposing high-risk vulnerabilities.", "support": "partner", - "currentVersion": "1.3.9", + "currentVersion": "1.3.10", "author": "Pentera", "url": "https://pentera.io", "email": "support@pentera.io", diff --git a/Packs/PenfieldAI/Integrations/Penfield/Penfield.yml b/Packs/PenfieldAI/Integrations/Penfield/Penfield.yml index 46597b8ac6c..a71ecdf31a6 100644 --- a/Packs/PenfieldAI/Integrations/Penfield/Penfield.yml +++ b/Packs/PenfieldAI/Integrations/Penfield/Penfield.yml @@ -56,7 +56,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/PenfieldAI/ReleaseNotes/1_0_8.md b/Packs/PenfieldAI/ReleaseNotes/1_0_8.md new file mode 100644 index 00000000000..d8682003e56 --- /dev/null +++ b/Packs/PenfieldAI/ReleaseNotes/1_0_8.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### Penfield + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### PenfieldAssign + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/PenfieldAI/Scripts/PenfieldAssign/PenfieldAssign.yml b/Packs/PenfieldAI/Scripts/PenfieldAssign/PenfieldAssign.yml index 82684d898d1..1467f0462a6 100644 --- a/Packs/PenfieldAI/Scripts/PenfieldAssign/PenfieldAssign.yml +++ b/Packs/PenfieldAI/Scripts/PenfieldAssign/PenfieldAssign.yml @@ -21,7 +21,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 dependson: must: diff --git a/Packs/PenfieldAI/pack_metadata.json b/Packs/PenfieldAI/pack_metadata.json index 965f6c3f90c..6be76ae98ae 100644 --- a/Packs/PenfieldAI/pack_metadata.json +++ b/Packs/PenfieldAI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PenfieldAI", "description": "Penfield.AI Incident Assignment for XSOAR", "support": "partner", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "Penfield.AI", "url": "https://penfield.ai/", "email": "dev@penfield.ai", diff --git a/Packs/PhishUp/Integrations/PhishUp/PhishUp.yml b/Packs/PhishUp/Integrations/PhishUp/PhishUp.yml index a1debac2217..ee64340dcdb 100644 --- a/Packs/PhishUp/Integrations/PhishUp/PhishUp.yml +++ b/Packs/PhishUp/Integrations/PhishUp/PhishUp.yml @@ -114,7 +114,7 @@ script: - contextPath: PhishUp.Evaluation description: returns "Phish" if any response has "Phish" result. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/PhishUp/ReleaseNotes/1_0_11.md b/Packs/PhishUp/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..87d170a7872 --- /dev/null +++ b/Packs/PhishUp/ReleaseNotes/1_0_11.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### PhishUp +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/PhishUp/pack_metadata.json b/Packs/PhishUp/pack_metadata.json index 01ee3dfd8e0..580995912ab 100644 --- a/Packs/PhishUp/pack_metadata.json +++ b/Packs/PhishUp/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PhishUp", "description": "PhishUp prevents phishing attacks, protects your staff and your brand with AI", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "PhishUp", "url": "https://phishup.co", "email": "info@phishup.co", @@ -42,4 +42,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/PicusAutomation/Integrations/Picus/Picus.yml b/Packs/PicusAutomation/Integrations/Picus/Picus.yml index 3e56a2b94bb..2821056e00b 100644 --- a/Packs/PicusAutomation/Integrations/Picus/Picus.yml +++ b/Packs/PicusAutomation/Integrations/Picus/Picus.yml @@ -338,7 +338,7 @@ script: type: Boolean - description: Generates an access token for api usage. Looks for X-Refresh-Token on header or refresh-token cookie. name: picus-get-access-token - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/PicusAutomation/ReleaseNotes/1_1_3.md b/Packs/PicusAutomation/ReleaseNotes/1_1_3.md new file mode 100644 index 00000000000..4e0b44636fe --- /dev/null +++ b/Packs/PicusAutomation/ReleaseNotes/1_1_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Picus Security + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/PicusAutomation/pack_metadata.json b/Packs/PicusAutomation/pack_metadata.json index db0bf642f02..781f7ce35fd 100644 --- a/Packs/PicusAutomation/pack_metadata.json +++ b/Packs/PicusAutomation/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PicusAutomation", "description": "Run commands on Picus and automate security validation with playbooks.", "support": "partner", - "currentVersion": "1.1.2", + "currentVersion": "1.1.3", "author": "Picus Security", "url": "http://support.picussecurity.com", "email": "blueteam@picussecurity.com", diff --git a/Packs/PicusNGAutomation/Integrations/PicusNG/PicusNG.yml b/Packs/PicusNGAutomation/Integrations/PicusNG/PicusNG.yml index 7bb61ee0474..f8b3b66183b 100644 --- a/Packs/PicusNGAutomation/Integrations/PicusNG/PicusNG.yml +++ b/Packs/PicusNGAutomation/Integrations/PicusNG/PicusNG.yml @@ -195,7 +195,7 @@ script: - contextPath: Picus.filterinsecure description: Insecure Attack List. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/PicusNGAutomation/ReleaseNotes/1_0_12.md b/Packs/PicusNGAutomation/ReleaseNotes/1_0_12.md new file mode 100644 index 00000000000..2f935bd75ee --- /dev/null +++ b/Packs/PicusNGAutomation/ReleaseNotes/1_0_12.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Picus Security NG +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/PicusNGAutomation/pack_metadata.json b/Packs/PicusNGAutomation/pack_metadata.json index 062a84f1ee9..b0573cdd958 100644 --- a/Packs/PicusNGAutomation/pack_metadata.json +++ b/Packs/PicusNGAutomation/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PicusNGAutomation", "description": "Run commands on Picus NG and automate security validation with playbooks.", "support": "partner", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Picus Security", "url": "http://support.picussecurity.com", "email": "blueteam@picussecurity.com", diff --git a/Packs/Polygon/Integrations/Polygon/Polygon.yml b/Packs/Polygon/Integrations/Polygon/Polygon.yml index c235354ddc8..d77f502dc13 100644 --- a/Packs/Polygon/Integrations/Polygon/Polygon.yml +++ b/Packs/Polygon/Integrations/Polygon/Polygon.yml @@ -368,7 +368,7 @@ script: description: Malware families. type: string description: Check file reputation. - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Polygon/ReleaseNotes/1_0_14.md b/Packs/Polygon/ReleaseNotes/1_0_14.md new file mode 100644 index 00000000000..ea8b1c9c28b --- /dev/null +++ b/Packs/Polygon/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Group-IB THF Polygon + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Polygon/pack_metadata.json b/Packs/Polygon/pack_metadata.json index 71cf8d4dc6f..8adc5163523 100644 --- a/Packs/Polygon/pack_metadata.json +++ b/Packs/Polygon/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Polygon", "description": "Analyze your files and URLs with Polygon playbooks and extract deep IOCs that appear when malicious code is triggered and executed.", "support": "partner", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Group-IB", "url": "https://thfwiki.group-ib.tech/about/summary/", "email": "thf@group-ib.com", diff --git a/Packs/QSS/Integrations/QSS/QSS.yml b/Packs/QSS/Integrations/QSS/QSS.yml index f152e4c05eb..ee2f07ff085 100644 --- a/Packs/QSS/Integrations/QSS/QSS.yml +++ b/Packs/QSS/Integrations/QSS/QSS.yml @@ -67,7 +67,7 @@ description: QSS integration helps you to fetch Cases from Q-SCMP and add new ca display: QSS name: QSS script: - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/QSS/ReleaseNotes/1_0_11.md b/Packs/QSS/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..9c6580510ed --- /dev/null +++ b/Packs/QSS/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### QSS + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/QSS/pack_metadata.json b/Packs/QSS/pack_metadata.json index 467d2e95245..2956d1dfc6a 100644 --- a/Packs/QSS/pack_metadata.json +++ b/Packs/QSS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Quantum Security Systems", "description": "Use SOC Case Management Platform (SCMP) solution to manage and automated SOC activities in an efficient way", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Quantum Security Systems", "url": "https://www.qss.com.sa", "email": "dev@qss.com.sa", diff --git a/Packs/Qintel/Integrations/QintelPMI/QintelPMI.yml b/Packs/Qintel/Integrations/QintelPMI/QintelPMI.yml index d421065ddb0..cce3ab342df 100644 --- a/Packs/Qintel/Integrations/QintelPMI/QintelPMI.yml +++ b/Packs/Qintel/Integrations/QintelPMI/QintelPMI.yml @@ -79,7 +79,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Qintel/Integrations/QintelQSentry/QintelQSentry.yml b/Packs/Qintel/Integrations/QintelQSentry/QintelQSentry.yml index 9a3f61f405c..006b7310335 100644 --- a/Packs/Qintel/Integrations/QintelQSentry/QintelQSentry.yml +++ b/Packs/Qintel/Integrations/QintelQSentry/QintelQSentry.yml @@ -105,7 +105,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Qintel/Integrations/QintelQWatch/QintelQWatch.yml b/Packs/Qintel/Integrations/QintelQWatch/QintelQWatch.yml index 05d0417132a..0f8f197c83c 100644 --- a/Packs/Qintel/Integrations/QintelQWatch/QintelQWatch.yml +++ b/Packs/Qintel/Integrations/QintelQWatch/QintelQWatch.yml @@ -79,7 +79,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Qintel/ReleaseNotes/1_0_16.md b/Packs/Qintel/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..382e598ea2e --- /dev/null +++ b/Packs/Qintel/ReleaseNotes/1_0_16.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### Qintel QWatch + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Qintel PMI + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Qintel QSentry + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Qintel/pack_metadata.json b/Packs/Qintel/pack_metadata.json index 5335ac00fa7..7b650eb4b13 100644 --- a/Packs/Qintel/pack_metadata.json +++ b/Packs/Qintel/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Qintel", "description": "Supports the Qintel suite of products including Patch Management Intelligence (PMI), QSentry and QWatch.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Qintel, LLC", "url": "https://qintel.com", "email": "integrations-support@qintel.com", diff --git a/Packs/QueryAI/Integrations/QueryAI/QueryAI.yml b/Packs/QueryAI/Integrations/QueryAI/QueryAI.yml index 3e1ec7bdc13..d27e544b6ca 100644 --- a/Packs/QueryAI/Integrations/QueryAI/QueryAI.yml +++ b/Packs/QueryAI/Integrations/QueryAI/QueryAI.yml @@ -59,7 +59,7 @@ script: - contextPath: QueryAI.query.markdown_string description: Readable Response after running query type: String - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/QueryAI/ReleaseNotes/1_0_11.md b/Packs/QueryAI/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..c3759a5765b --- /dev/null +++ b/Packs/QueryAI/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Query.AI + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/QueryAI/pack_metadata.json b/Packs/QueryAI/pack_metadata.json index f82a960f972..8bc43e8b17f 100644 --- a/Packs/QueryAI/pack_metadata.json +++ b/Packs/QueryAI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "QueryAI", "description": "Query.AI is a decentralized data access and analysis technology that simplifies security investigations across disparate platforms without data duplication.", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Query.AI", "url": "https://www.query.ai", "email": "support@query.ai", diff --git a/Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.yml b/Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.yml index 055fef94046..229d5ac7e43 100644 --- a/Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.yml +++ b/Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.yml @@ -23,7 +23,7 @@ configuration: script: type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 script: '' commands: - name: quttera-scan-start diff --git a/Packs/QutteraWebsiteMalwareScanner/ReleaseNotes/1_0_19.md b/Packs/QutteraWebsiteMalwareScanner/ReleaseNotes/1_0_19.md new file mode 100644 index 00000000000..9d7242f6428 --- /dev/null +++ b/Packs/QutteraWebsiteMalwareScanner/ReleaseNotes/1_0_19.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### QutteraWebsiteMalwareScanner + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/QutteraWebsiteMalwareScanner/pack_metadata.json b/Packs/QutteraWebsiteMalwareScanner/pack_metadata.json index db496c712fd..e7263004a43 100644 --- a/Packs/QutteraWebsiteMalwareScanner/pack_metadata.json +++ b/Packs/QutteraWebsiteMalwareScanner/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Quttera Website Malware Scanner", "description": "Detect suspicious/malicious/blocklisted content on domains/URLs. Run real-time normal/heuristic scan and database queries.", "support": "partner", - "currentVersion": "1.0.18", + "currentVersion": "1.0.19", "author": "Quttera LTD", "url": "https://scannerapi.quttera.com/api/v3", "email": "support@quttera.com", diff --git a/Packs/RSTCloud/Integrations/RSTCloudThreatFeedAPI/RSTCloudThreatFeedAPI.yml b/Packs/RSTCloud/Integrations/RSTCloudThreatFeedAPI/RSTCloudThreatFeedAPI.yml index 3e65448f179..246e8b7c495 100644 --- a/Packs/RSTCloud/Integrations/RSTCloudThreatFeedAPI/RSTCloudThreatFeedAPI.yml +++ b/Packs/RSTCloud/Integrations/RSTCloudThreatFeedAPI/RSTCloudThreatFeedAPI.yml @@ -511,7 +511,7 @@ script: name: description description: Submits a potential False Positive to RST Threat Feed. name: rst-submit-fp - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/RSTCloud/ReleaseNotes/1_1_5.md b/Packs/RSTCloud/ReleaseNotes/1_1_5.md new file mode 100644 index 00000000000..55f58cc6927 --- /dev/null +++ b/Packs/RSTCloud/ReleaseNotes/1_1_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### RST Cloud - Threat Feed API + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/RSTCloud/pack_metadata.json b/Packs/RSTCloud/pack_metadata.json index 12f111b8710..92e23843976 100644 --- a/Packs/RSTCloud/pack_metadata.json +++ b/Packs/RSTCloud/pack_metadata.json @@ -2,7 +2,7 @@ "name": "RST Threat Feed", "description": "High-fidelity threat intelligence database available via API to check domains, URLs, IP addresses and Hashes", "support": "partner", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "RST Cloud", "url": "https://rstcloud.net/", "email": "support@rstcloud.net", diff --git a/Packs/RecordedFutureASI/Integrations/RecordedFutureASI/RecordedFutureASI.yml b/Packs/RecordedFutureASI/Integrations/RecordedFutureASI/RecordedFutureASI.yml index 7e46dd6ee47..99e1bbfc540 100644 --- a/Packs/RecordedFutureASI/Integrations/RecordedFutureASI/RecordedFutureASI.yml +++ b/Packs/RecordedFutureASI/Integrations/RecordedFutureASI/RecordedFutureASI.yml @@ -77,7 +77,7 @@ script: - name: expand_issues description: true/false to make an incident per host & per new issue. description: Gets the issues for a project from a particular snapshot (defaults to recent). - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 6.5.0 diff --git a/Packs/RecordedFutureASI/ReleaseNotes/2_0_16.md b/Packs/RecordedFutureASI/ReleaseNotes/2_0_16.md new file mode 100644 index 00000000000..7ae6b28fde8 --- /dev/null +++ b/Packs/RecordedFutureASI/ReleaseNotes/2_0_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Recorded Future Attack Surface Intelligence + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/RecordedFutureASI/pack_metadata.json b/Packs/RecordedFutureASI/pack_metadata.json index 21843618baf..12c532699e2 100644 --- a/Packs/RecordedFutureASI/pack_metadata.json +++ b/Packs/RecordedFutureASI/pack_metadata.json @@ -3,7 +3,7 @@ "prevName": "Recorded Future ASI", "description": "Helps you take risk prioritization to the next level by helping you identify the biggest weaknesses within your attack surface.", "support": "partner", - "currentVersion": "2.0.15", + "currentVersion": "2.0.16", "author": "Recorded Future", "url": "", "email": "support@recordedfuture.com", diff --git a/Packs/Resecurity/Integrations/ResecurityMonitoring/ResecurityMonitoring.yml b/Packs/Resecurity/Integrations/ResecurityMonitoring/ResecurityMonitoring.yml index d1653bb1cc0..19fc203508e 100644 --- a/Packs/Resecurity/Integrations/ResecurityMonitoring/ResecurityMonitoring.yml +++ b/Packs/Resecurity/Integrations/ResecurityMonitoring/ResecurityMonitoring.yml @@ -77,7 +77,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.8.0 tests: - No tests (auto formatted) diff --git a/Packs/Resecurity/ReleaseNotes/1_0_3.md b/Packs/Resecurity/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..0e19479a887 --- /dev/null +++ b/Packs/Resecurity/ReleaseNotes/1_0_3.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Resecurity Monitoring +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Resecurity/pack_metadata.json b/Packs/Resecurity/pack_metadata.json index e2930f949fb..c5b3f735480 100644 --- a/Packs/Resecurity/pack_metadata.json +++ b/Packs/Resecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Resecurity", "description": "Resecurity pack description", "support": "partner", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Resecurity, Inc.", "url": "https://www.resecurity.com", "email": "contact@resecurity.com", diff --git a/Packs/ReversingLabs_A1000/ReleaseNotes/2_4_1.md b/Packs/ReversingLabs_A1000/ReleaseNotes/2_4_1.md new file mode 100644 index 00000000000..747ad08e7b6 --- /dev/null +++ b/Packs/ReversingLabs_A1000/ReleaseNotes/2_4_1.md @@ -0,0 +1,7 @@ + +#### Scripts + +##### A1000FinalClassification +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/ReversingLabs_A1000/Scripts/A1000FinalClassification/A1000FinalClassification.yml b/Packs/ReversingLabs_A1000/Scripts/A1000FinalClassification/A1000FinalClassification.yml index 60e5d7be8a6..8b72ad4dee3 100644 --- a/Packs/ReversingLabs_A1000/Scripts/A1000FinalClassification/A1000FinalClassification.yml +++ b/Packs/ReversingLabs_A1000/Scripts/A1000FinalClassification/A1000FinalClassification.yml @@ -52,7 +52,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/ReversingLabs_A1000/pack_metadata.json b/Packs/ReversingLabs_A1000/pack_metadata.json index f74cc356ddb..a7144293aa0 100644 --- a/Packs/ReversingLabs_A1000/pack_metadata.json +++ b/Packs/ReversingLabs_A1000/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ReversingLabs A1000", "description": "Powerful threat detection and file analysis platform. Get detailed information on each file's status and threat capabilities.", "support": "partner", - "currentVersion": "2.4.0", + "currentVersion": "2.4.1", "author": "ReversingLabs", "url": "https://www.reversinglabs.com/products/malware-threat-hunting-and-investigations", "email": "support@reversinglabs.com", diff --git a/Packs/RiskIQDigitalFootprint/Integrations/RiskIQDigitalFootprint/RiskIQDigitalFootprint.yml b/Packs/RiskIQDigitalFootprint/Integrations/RiskIQDigitalFootprint/RiskIQDigitalFootprint.yml index c439d6f2014..639739dd46b 100644 --- a/Packs/RiskIQDigitalFootprint/Integrations/RiskIQDigitalFootprint/RiskIQDigitalFootprint.yml +++ b/Packs/RiskIQDigitalFootprint/Integrations/RiskIQDigitalFootprint/RiskIQDigitalFootprint.yml @@ -3233,7 +3233,7 @@ script: - contextPath: RiskIQDigitalFootprint.Task.totalUpdates description: Number of total asset(s) that have been updated. type: Number - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/RiskIQDigitalFootprint/ReleaseNotes/1_1_22.md b/Packs/RiskIQDigitalFootprint/ReleaseNotes/1_1_22.md new file mode 100644 index 00000000000..7d1e70e851b --- /dev/null +++ b/Packs/RiskIQDigitalFootprint/ReleaseNotes/1_1_22.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### RiskIQ Digital Footprint + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### RiskIQDigitalFootprintAssetDetailsWidgetScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/RiskIQDigitalFootprint/Scripts/RiskIQDigitalFootprintAssetDetailsWidgetScript/RiskIQDigitalFootprintAssetDetailsWidgetScript.yml b/Packs/RiskIQDigitalFootprint/Scripts/RiskIQDigitalFootprintAssetDetailsWidgetScript/RiskIQDigitalFootprintAssetDetailsWidgetScript.yml index 2bd504659f2..ed9f17cf940 100644 --- a/Packs/RiskIQDigitalFootprint/Scripts/RiskIQDigitalFootprintAssetDetailsWidgetScript/RiskIQDigitalFootprintAssetDetailsWidgetScript.yml +++ b/Packs/RiskIQDigitalFootprint/Scripts/RiskIQDigitalFootprintAssetDetailsWidgetScript/RiskIQDigitalFootprintAssetDetailsWidgetScript.yml @@ -13,7 +13,7 @@ dependson: must: - '|||df-get-asset' timeout: 300ns -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/RiskIQDigitalFootprint/pack_metadata.json b/Packs/RiskIQDigitalFootprint/pack_metadata.json index b60137e31e4..cd37bd313f9 100644 --- a/Packs/RiskIQDigitalFootprint/pack_metadata.json +++ b/Packs/RiskIQDigitalFootprint/pack_metadata.json @@ -2,7 +2,7 @@ "name": "RiskIQ Digital Footprint", "description": "RiskIQ Digital Footprint integration enables your security team to manage assets outside your firewall and provides you with the ability to add or update assets and analyze your digital footprint from the view of the global adversary.", "support": "community", - "currentVersion": "1.1.21", + "currentVersion": "1.1.22", "author": "RiskIQ", "url": "https://www.riskiq.com/resources/support/", "email": "paloaltonetworks@riskiq.net", diff --git a/Packs/RiskSense/Integrations/RiskSense/RiskSense.yml b/Packs/RiskSense/Integrations/RiskSense/RiskSense.yml index a01aaab3e5e..e2f2c118e15 100644 --- a/Packs/RiskSense/Integrations/RiskSense/RiskSense.yml +++ b/Packs/RiskSense/Integrations/RiskSense/RiskSense.yml @@ -1912,7 +1912,7 @@ script: description: The time when the tag was associated. type: String description: Apply the new or existing tag to the asset, creates a new tag if it does not exist in RiskSense. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 type: python diff --git a/Packs/RiskSense/ReleaseNotes/1_0_16.md b/Packs/RiskSense/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..ab122850cc2 --- /dev/null +++ b/Packs/RiskSense/ReleaseNotes/1_0_16.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### RiskSense + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### RiskSenseGetRansomewareCVEScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### DisplayCVEChartScript + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/RiskSense/Scripts/RiskSenseDisplayCVEChartScript/RiskSenseDisplayCVEChartScript.yml b/Packs/RiskSense/Scripts/RiskSenseDisplayCVEChartScript/RiskSenseDisplayCVEChartScript.yml index 68dd9d74593..5987f3216f9 100644 --- a/Packs/RiskSense/Scripts/RiskSenseDisplayCVEChartScript/RiskSenseDisplayCVEChartScript.yml +++ b/Packs/RiskSense/Scripts/RiskSenseDisplayCVEChartScript/RiskSenseDisplayCVEChartScript.yml @@ -14,7 +14,7 @@ timeout: '0' type: python tags: - RiskSense -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 5.0.0 diff --git a/Packs/RiskSense/Scripts/RiskSenseGetRansomewareCVEScript/RiskSenseGetRansomewareCVEScript.yml b/Packs/RiskSense/Scripts/RiskSenseGetRansomewareCVEScript/RiskSenseGetRansomewareCVEScript.yml index 2c109147a3a..6eaa8c47a26 100644 --- a/Packs/RiskSense/Scripts/RiskSenseGetRansomewareCVEScript/RiskSenseGetRansomewareCVEScript.yml +++ b/Packs/RiskSense/Scripts/RiskSenseGetRansomewareCVEScript/RiskSenseGetRansomewareCVEScript.yml @@ -132,7 +132,7 @@ type: python dependson: must: - '|||risksense-get-host-findings' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 5.0.0 diff --git a/Packs/RiskSense/pack_metadata.json b/Packs/RiskSense/pack_metadata.json index c27fc5a055f..f0067bcaf83 100644 --- a/Packs/RiskSense/pack_metadata.json +++ b/Packs/RiskSense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "RiskSense", "description": "RiskSense is a cloud-based platform that provides vulnerability management and prioritization to measure and control cybersecurity risk.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "RiskSense", "url": "https://risksense.com/support/", "email": "support@risksense.com", diff --git a/Packs/RubrikPolaris/ReleaseNotes/1_3_5.md b/Packs/RubrikPolaris/ReleaseNotes/1_3_5.md new file mode 100644 index 00000000000..0e84ab93c1f --- /dev/null +++ b/Packs/RubrikPolaris/ReleaseNotes/1_3_5.md @@ -0,0 +1,30 @@ + +#### Scripts + +##### RubrikSonarOpenAccessFiles + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikSonarSetIncidentSeverityUsingUserRiskLevel + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikRadarFilesModified + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### DateToTimeStamp + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikRadarFilesAdded + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikSonarTotalHits + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikRadarFilesDeleted + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikSonarSensitiveHits + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### RubrikCDMClusterConnectionState + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/RubrikPolaris/Scripts/DateToTimeStamp/DateToTimeStamp.yml b/Packs/RubrikPolaris/Scripts/DateToTimeStamp/DateToTimeStamp.yml index 69014de9103..34ea9f39e01 100644 --- a/Packs/RubrikPolaris/Scripts/DateToTimeStamp/DateToTimeStamp.yml +++ b/Packs/RubrikPolaris/Scripts/DateToTimeStamp/DateToTimeStamp.yml @@ -15,7 +15,7 @@ args: description: Date to convert. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/RubrikPolaris/Scripts/RubrikCDMClusterConnectionState/RubrikCDMClusterConnectionState.yml b/Packs/RubrikPolaris/Scripts/RubrikCDMClusterConnectionState/RubrikCDMClusterConnectionState.yml index 880ebb94784..c6df5837df6 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikCDMClusterConnectionState/RubrikCDMClusterConnectionState.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikCDMClusterConnectionState/RubrikCDMClusterConnectionState.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Radar amount of Files Added. commonfields: id: RubrikCDMClusterConnectionState version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikCDMClusterConnectionState runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesAdded/RubrikRadarFilesAdded.yml b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesAdded/RubrikRadarFilesAdded.yml index 458e14a136f..47c97dd9a07 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesAdded/RubrikRadarFilesAdded.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesAdded/RubrikRadarFilesAdded.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Radar amount of Files Added. commonfields: id: RubrikRadarFilesAdded version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikRadarFilesAdded runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesDeleted/RubrikRadarFilesDeleted.yml b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesDeleted/RubrikRadarFilesDeleted.yml index 793c7cbdf7e..81d02014d72 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesDeleted/RubrikRadarFilesDeleted.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesDeleted/RubrikRadarFilesDeleted.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Radar amount of Files Deleted. commonfields: id: RubrikRadarFilesDeleted version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikRadarFilesDeleted runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesModified/RubrikRadarFilesModified.yml b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesModified/RubrikRadarFilesModified.yml index 09998966112..4b30a0bcb7a 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikRadarFilesModified/RubrikRadarFilesModified.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikRadarFilesModified/RubrikRadarFilesModified.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Radar amount of Files Modified. commonfields: id: RubrikRadarFilesModified version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikRadarFilesModified runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/Scripts/RubrikSonarOpenAccessFiles/RubrikSonarOpenAccessFiles.yml b/Packs/RubrikPolaris/Scripts/RubrikSonarOpenAccessFiles/RubrikSonarOpenAccessFiles.yml index 5d289478e6e..af394ecb1bb 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikSonarOpenAccessFiles/RubrikSonarOpenAccessFiles.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikSonarOpenAccessFiles/RubrikSonarOpenAccessFiles.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Polaris Sonar Open Access Files Count. commonfields: id: RubrikSonarOpenAccessFiles version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikSonarOpenAccessFiles runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/Scripts/RubrikSonarSensitiveHits/RubrikSonarSensitiveHits.yml b/Packs/RubrikPolaris/Scripts/RubrikSonarSensitiveHits/RubrikSonarSensitiveHits.yml index bd5a0d757e6..20cea73da1d 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikSonarSensitiveHits/RubrikSonarSensitiveHits.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikSonarSensitiveHits/RubrikSonarSensitiveHits.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Polaris Sonar data classification results. commonfields: id: RubrikSonarSensitiveHits version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 name: RubrikSonarSensitiveHits runas: DBotWeakRole script: '' diff --git a/Packs/RubrikPolaris/Scripts/RubrikSonarSetIncidentSeverityUsingUserRiskLevel/RubrikSonarSetIncidentSeverityUsingUserRiskLevel.yml b/Packs/RubrikPolaris/Scripts/RubrikSonarSetIncidentSeverityUsingUserRiskLevel/RubrikSonarSetIncidentSeverityUsingUserRiskLevel.yml index a716210364c..e16e8e78301 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikSonarSetIncidentSeverityUsingUserRiskLevel/RubrikSonarSetIncidentSeverityUsingUserRiskLevel.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikSonarSetIncidentSeverityUsingUserRiskLevel/RubrikSonarSetIncidentSeverityUsingUserRiskLevel.yml @@ -20,7 +20,7 @@ system: false timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.87159 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 marketplaces: - xsoar diff --git a/Packs/RubrikPolaris/Scripts/RubrikSonarTotalHits/RubrikSonarTotalHits.yml b/Packs/RubrikPolaris/Scripts/RubrikSonarTotalHits/RubrikSonarTotalHits.yml index fceb5810340..7418459cefe 100644 --- a/Packs/RubrikPolaris/Scripts/RubrikSonarTotalHits/RubrikSonarTotalHits.yml +++ b/Packs/RubrikPolaris/Scripts/RubrikSonarTotalHits/RubrikSonarTotalHits.yml @@ -2,7 +2,7 @@ comment: Shows the Rubrik Polaris Sonar Total Hits. commonfields: id: RubrikSonarTotalHits version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RubrikSonarTotalHits runas: DBotWeakRole diff --git a/Packs/RubrikPolaris/pack_metadata.json b/Packs/RubrikPolaris/pack_metadata.json index b7e7728a322..f88f397b2ed 100644 --- a/Packs/RubrikPolaris/pack_metadata.json +++ b/Packs/RubrikPolaris/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Rubrik Security Cloud", "description": "Rubrik Security Cloud revolutionizes the data management market, specifically backup/recovery, archival, and DR, by providing a global policy framework, workflow orchestration, and deep data intelligence as cloud-delivered applications. The content pack fetches Rubrik Anomaly Event and provides playbooks to analyze, discover and recover -- to mention a few -- organizational data. The content pack is rich with commands to perform on-demand scans, backups, recoveries and many more features exposed by the RSC API.", "support": "partner", - "currentVersion": "1.3.4", + "currentVersion": "1.3.5", "author": "Rubrik", "url": "https://www.rubrik.com/support/", "email": "support@rubrik.com", diff --git a/Packs/SCADAfence_CNM/Integrations/SCADAfenceCNM/SCADAfenceCNM.yml b/Packs/SCADAfence_CNM/Integrations/SCADAfenceCNM/SCADAfenceCNM.yml index 98006e4ff70..26336c5f883 100644 --- a/Packs/SCADAfence_CNM/Integrations/SCADAfenceCNM/SCADAfenceCNM.yml +++ b/Packs/SCADAfence_CNM/Integrations/SCADAfenceCNM/SCADAfenceCNM.yml @@ -255,7 +255,7 @@ script: description: Fetches all connections from the CNM. isfetch: true runonce: false - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 tests: - SCADAfence_test fromversion: 5.0.0 diff --git a/Packs/SCADAfence_CNM/ReleaseNotes/1_0_11.md b/Packs/SCADAfence_CNM/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..f27ae732316 --- /dev/null +++ b/Packs/SCADAfence_CNM/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SCADAfence CNM + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SCADAfence_CNM/pack_metadata.json b/Packs/SCADAfence_CNM/pack_metadata.json index 1348be23262..7674a4438b5 100644 --- a/Packs/SCADAfence_CNM/pack_metadata.json +++ b/Packs/SCADAfence_CNM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SCADAfence CNM", "description": "Fetching data from CNM", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "SCADAfence CNM", "url": "www.scadafence.com", "email": "support@scadafence.com", diff --git a/Packs/SOCRadar/Integrations/SOCRadarIncidents/SOCRadarIncidents.yml b/Packs/SOCRadar/Integrations/SOCRadarIncidents/SOCRadarIncidents.yml index 5223b7d5e71..5c8da08edd0 100644 --- a/Packs/SOCRadar/Integrations/SOCRadarIncidents/SOCRadarIncidents.yml +++ b/Packs/SOCRadar/Integrations/SOCRadarIncidents/SOCRadarIncidents.yml @@ -104,7 +104,7 @@ script: name: comments description: Marks incident as resolved in SOCRadar platform. name: socradar-mark-incident-resolved - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/SOCRadar/Integrations/SOCRadarThreatFusion/SOCRadarThreatFusion.yml b/Packs/SOCRadar/Integrations/SOCRadarThreatFusion/SOCRadarThreatFusion.yml index 8888fd8bf8f..cd995ec445a 100644 --- a/Packs/SOCRadar/Integrations/SOCRadarThreatFusion/SOCRadarThreatFusion.yml +++ b/Packs/SOCRadar/Integrations/SOCRadarThreatFusion/SOCRadarThreatFusion.yml @@ -642,7 +642,7 @@ script: - contextPath: DBotScore.Vendor description: The vendor used to calculate the indicator score. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/SOCRadar/ReleaseNotes/2_0_14.md b/Packs/SOCRadar/ReleaseNotes/2_0_14.md new file mode 100644 index 00000000000..b584476595d --- /dev/null +++ b/Packs/SOCRadar/ReleaseNotes/2_0_14.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### SOCRadar Incidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### SOCRadar ThreatFusion + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SOCRadar/pack_metadata.json b/Packs/SOCRadar/pack_metadata.json index 2a89b15c420..209ced7bc6f 100644 --- a/Packs/SOCRadar/pack_metadata.json +++ b/Packs/SOCRadar/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SOCRadar", "description": "Streamline remediation of alerts and incidents. Make quick, automated queries on ThreatFusion to get a risk reputation score.", "support": "partner", - "currentVersion": "2.0.13", + "currentVersion": "2.0.14", "author": "SOCRadar Cyber Intelligence Inc.", "url": "www.socradar.io", "email": "xsoar@socradar.io", diff --git a/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml b/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml index cf78ff1299e..8b6e7ec9a30 100644 --- a/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml +++ b/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml @@ -75,7 +75,7 @@ script: type: python subtype: python3 isfetchevents: true - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 marketplaces: - marketplacev2 fromversion: 6.8.0 diff --git a/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_41.md b/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_41.md new file mode 100644 index 00000000000..41cbc6584e5 --- /dev/null +++ b/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_41.md @@ -0,0 +1,18 @@ + +#### Integrations + +##### Thales SafeNet Trusted Access Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +#### Scripts + +##### STA-PostProcessing +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### STA-FetchListContent +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/SafeNet_Trusted_Access/Scripts/STAFetchListContent/STAFetchListContent.yml b/Packs/SafeNet_Trusted_Access/Scripts/STAFetchListContent/STAFetchListContent.yml index 85afcc5f113..53ff76f723e 100644 --- a/Packs/SafeNet_Trusted_Access/Scripts/STAFetchListContent/STAFetchListContent.yml +++ b/Packs/SafeNet_Trusted_Access/Scripts/STAFetchListContent/STAFetchListContent.yml @@ -10,7 +10,7 @@ commonfields: dependson: must: - Builtin|||getList -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: STA-FetchListContent outputs: diff --git a/Packs/SafeNet_Trusted_Access/Scripts/STAPostProcessing/STAPostProcessing.yml b/Packs/SafeNet_Trusted_Access/Scripts/STAPostProcessing/STAPostProcessing.yml index 435baa93e9b..91d49e620a3 100644 --- a/Packs/SafeNet_Trusted_Access/Scripts/STAPostProcessing/STAPostProcessing.yml +++ b/Packs/SafeNet_Trusted_Access/Scripts/STAPostProcessing/STAPostProcessing.yml @@ -2,7 +2,7 @@ comment: Post processing script to remove the user from the Unusual Activity Gro commonfields: id: STA-PostProcessing version: -1 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: STA-PostProcessing runas: DBotWeakRole diff --git a/Packs/SafeNet_Trusted_Access/pack_metadata.json b/Packs/SafeNet_Trusted_Access/pack_metadata.json index 95140d2795e..f888d54ba51 100644 --- a/Packs/SafeNet_Trusted_Access/pack_metadata.json +++ b/Packs/SafeNet_Trusted_Access/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Thales SafeNet Trusted Access", "description": "SafeNet Trusted Access by Thales is an access management solution that allows organizations to centrally manage and secure access to business applications.", "support": "partner", - "currentVersion": "2.0.40", + "currentVersion": "2.0.41", "author": "Thales", "url": "https://supportportal.gemalto.com/csm/?id=portal_home_page", "email": "", diff --git a/Packs/Safewalk/Integrations/SafewalkManagement/SafewalkManagement.yml b/Packs/Safewalk/Integrations/SafewalkManagement/SafewalkManagement.yml index 8edca4eeb65..eaf69b89507 100644 --- a/Packs/Safewalk/Integrations/SafewalkManagement/SafewalkManagement.yml +++ b/Packs/Safewalk/Integrations/SafewalkManagement/SafewalkManagement.yml @@ -1051,7 +1051,7 @@ script: - name: new-group-name description: New user group. description: Update user group. - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Safewalk/Integrations/SafewalkReports/SafewalkReports.yml b/Packs/Safewalk/Integrations/SafewalkReports/SafewalkReports.yml index ac7458f8a2e..901f8cd0def 100644 --- a/Packs/Safewalk/Integrations/SafewalkReports/SafewalkReports.yml +++ b/Packs/Safewalk/Integrations/SafewalkReports/SafewalkReports.yml @@ -319,7 +319,7 @@ script: type: Number arguments: [] description: safewalk-get-users-associations-indicators. - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Safewalk/ReleaseNotes/1_0_7.md b/Packs/Safewalk/ReleaseNotes/1_0_7.md new file mode 100644 index 00000000000..fb359226632 --- /dev/null +++ b/Packs/Safewalk/ReleaseNotes/1_0_7.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Safewalk Management + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### Safewalk Reports + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Safewalk/pack_metadata.json b/Packs/Safewalk/pack_metadata.json index 903940aff8c..6da640084e7 100644 --- a/Packs/Safewalk/pack_metadata.json +++ b/Packs/Safewalk/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Altipeak", "description": "Integration with Safewalk identity management and report service", "support": "partner", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Altipeak", "url": "https://www.altipeaksecurity.com", "email": "support@altipeak.com", diff --git a/Packs/SailPointIdentityNow/Integrations/SailPointIdentityNow/SailPointIdentityNow.yml b/Packs/SailPointIdentityNow/Integrations/SailPointIdentityNow/SailPointIdentityNow.yml index 8082b02e615..d4a2ada4337 100644 --- a/Packs/SailPointIdentityNow/Integrations/SailPointIdentityNow/SailPointIdentityNow.yml +++ b/Packs/SailPointIdentityNow/Integrations/SailPointIdentityNow/SailPointIdentityNow.yml @@ -510,7 +510,7 @@ script: name: comment description: Revoke access request for a single object(access profile or role) for a single user. name: identitynow-request-revoke - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/SailPointIdentityNow/ReleaseNotes/1_0_9.md b/Packs/SailPointIdentityNow/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..2c03043dbe1 --- /dev/null +++ b/Packs/SailPointIdentityNow/ReleaseNotes/1_0_9.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SailPoint IdentityNow + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SailPointIdentityNow/pack_metadata.json b/Packs/SailPointIdentityNow/pack_metadata.json index 72ed2465e8c..5e5b180e681 100644 --- a/Packs/SailPointIdentityNow/pack_metadata.json +++ b/Packs/SailPointIdentityNow/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SailPoint IdentityNow", "description": "SailPoint IdentityNow content pack enables XSOAR customers to utilize the deep, enriched contextual data in the SailPoint IdentityNow platform to better drive identity-aware security practices.", "support": "partner", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "SailPoint", "url": "https://support.sailpoint.com/hc/en-us/requests/new", "email": "support.idplusa@sailpoint.com", diff --git a/Packs/SecBI/Integrations/SecBI/SecBI.yml b/Packs/SecBI/Integrations/SecBI/SecBI.yml index 8eaa548d608..15c805bce09 100644 --- a/Packs/SecBI/Integrations/SecBI/SecBI.yml +++ b/Packs/SecBI/Integrations/SecBI/SecBI.yml @@ -93,7 +93,7 @@ script: - contextPath: SecBI.Incident.LastAppearance description: The last appearance of data of the SecBI incident. type: Date - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/SecBI/ReleaseNotes/1_0_6.md b/Packs/SecBI/ReleaseNotes/1_0_6.md new file mode 100644 index 00000000000..9ad0142d2c8 --- /dev/null +++ b/Packs/SecBI/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SecBI + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SecBI/pack_metadata.json b/Packs/SecBI/pack_metadata.json index 909a22a42f1..db512360831 100644 --- a/Packs/SecBI/pack_metadata.json +++ b/Packs/SecBI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SecBI", "description": "A threat, intelligence, and investigation platform, enabled by automation of detection and investigation, including remediation and prevention policy enforcements on all integrated appliances.", "support": "partner", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "SecBI", "url": "https://www.secbi.com", "email": "support@secbi.com", diff --git a/Packs/SecneurXAnalysis/Integrations/SecneurXAnalysis/SecneurXAnalysis.yml b/Packs/SecneurXAnalysis/Integrations/SecneurXAnalysis/SecneurXAnalysis.yml index a3b7cd0abaa..faaf063ccd2 100644 --- a/Packs/SecneurXAnalysis/Integrations/SecneurXAnalysis/SecneurXAnalysis.yml +++ b/Packs/SecneurXAnalysis/Integrations/SecneurXAnalysis/SecneurXAnalysis.yml @@ -215,7 +215,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - Detonate File - SecneurX Analysis - Test diff --git a/Packs/SecneurXAnalysis/ReleaseNotes/1_0_11.md b/Packs/SecneurXAnalysis/ReleaseNotes/1_0_11.md new file mode 100644 index 00000000000..ed42b36a228 --- /dev/null +++ b/Packs/SecneurXAnalysis/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SecneurX Analysis + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SecneurXAnalysis/pack_metadata.json b/Packs/SecneurXAnalysis/pack_metadata.json index 0ab00d82e0c..61a5738f928 100644 --- a/Packs/SecneurXAnalysis/pack_metadata.json +++ b/Packs/SecneurXAnalysis/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SecneurX Analysis", "description": "Fully automated malware dynamic analysis sandboxing", "support": "partner", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "SecneurX Technologies", "created": "2022-07-25T12:00:00Z", "url": "https://www.secneurx.com/products", diff --git a/Packs/SecneurXThreatFeeds/Integrations/SecneurXThreatFeeds/SecneurXThreatFeeds.yml b/Packs/SecneurXThreatFeeds/Integrations/SecneurXThreatFeeds/SecneurXThreatFeeds.yml index 3d6c2f4e6e0..f9143f7ad46 100644 --- a/Packs/SecneurXThreatFeeds/Integrations/SecneurXThreatFeeds/SecneurXThreatFeeds.yml +++ b/Packs/SecneurXThreatFeeds/Integrations/SecneurXThreatFeeds/SecneurXThreatFeeds.yml @@ -108,7 +108,7 @@ script: script: '-' subtype: python3 type: python - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/SecneurXThreatFeeds/ReleaseNotes/1_0_10.md b/Packs/SecneurXThreatFeeds/ReleaseNotes/1_0_10.md new file mode 100644 index 00000000000..ca7396767bf --- /dev/null +++ b/Packs/SecneurXThreatFeeds/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SecneurX Threat Feeds + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SecneurXThreatFeeds/pack_metadata.json b/Packs/SecneurXThreatFeeds/pack_metadata.json index cdbf9fa480d..3732196a393 100644 --- a/Packs/SecneurXThreatFeeds/pack_metadata.json +++ b/Packs/SecneurXThreatFeeds/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Secneurx Threat Feeds", "description": "This pack contains integration to fetch indicators from SecneurX Threat Intelligence Feeds", "support": "partner", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "SecneurX Technologies", "url": "https://www.secneurx.com/products", "email": "support@secneurx.com", diff --git a/Packs/SecureWorks/Integrations/TaegisXDRv2/TaegisXDRv2.yml b/Packs/SecureWorks/Integrations/TaegisXDRv2/TaegisXDRv2.yml index b6be3280a95..bdeff79979b 100644 --- a/Packs/SecureWorks/Integrations/TaegisXDRv2/TaegisXDRv2.yml +++ b/Packs/SecureWorks/Integrations/TaegisXDRv2/TaegisXDRv2.yml @@ -547,7 +547,7 @@ script: - contextPath: TaegisXDR.InvestigationEvidenceUpdate description: The investigation that received the update. description: Add alerts and events to an existing investigation. - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false subtype: python3 diff --git a/Packs/SecureWorks/ReleaseNotes/5_0_9.md b/Packs/SecureWorks/ReleaseNotes/5_0_9.md new file mode 100644 index 00000000000..7cab6d9b067 --- /dev/null +++ b/Packs/SecureWorks/ReleaseNotes/5_0_9.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### TaegisXDR v2 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SecureWorks/pack_metadata.json b/Packs/SecureWorks/pack_metadata.json index bc390221274..6323a6eb58f 100644 --- a/Packs/SecureWorks/pack_metadata.json +++ b/Packs/SecureWorks/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Secureworks", "description": "Provides access to the Secureworks CTP and Taegis XDR systems", "support": "partner", - "currentVersion": "5.0.8", + "currentVersion": "5.0.9", "author": "Secureworks", "url": "https://ctpx.secureworks.com", "email": "support@secureworks.com", diff --git a/Packs/Securonix/ReleaseNotes/2_0_22.md b/Packs/Securonix/ReleaseNotes/2_0_22.md new file mode 100644 index 00000000000..174beccece6 --- /dev/null +++ b/Packs/Securonix/ReleaseNotes/2_0_22.md @@ -0,0 +1,12 @@ + +#### Scripts + +##### SecuronixGetViolations + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### SecuronixCloseHistoricalXSOARIncidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### UpdateSecuronixIncidentStatus + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Securonix/Scripts/SecuronixCloseHistoricalXSOARIncidents/SecuronixCloseHistoricalXSOARIncidents.yml b/Packs/Securonix/Scripts/SecuronixCloseHistoricalXSOARIncidents/SecuronixCloseHistoricalXSOARIncidents.yml index bbd79a3c416..a78b20cb022 100644 --- a/Packs/Securonix/Scripts/SecuronixCloseHistoricalXSOARIncidents/SecuronixCloseHistoricalXSOARIncidents.yml +++ b/Packs/Securonix/Scripts/SecuronixCloseHistoricalXSOARIncidents/SecuronixCloseHistoricalXSOARIncidents.yml @@ -30,7 +30,7 @@ timeout: 3.6µs dependson: must: - '|||securonix-incident-activity-history-get' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/Securonix/Scripts/SecuronixGetViolations/SecuronixGetViolations.yml b/Packs/Securonix/Scripts/SecuronixGetViolations/SecuronixGetViolations.yml index 5c21b7ddf1b..91d6fe49fca 100644 --- a/Packs/Securonix/Scripts/SecuronixGetViolations/SecuronixGetViolations.yml +++ b/Packs/Securonix/Scripts/SecuronixGetViolations/SecuronixGetViolations.yml @@ -11,7 +11,7 @@ comment: Gets a list of violations related to a specific threat from the context enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/Securonix/Scripts/UpdateSecuronixIncidentStatus/UpdateSecuronixIncidentStatus.yml b/Packs/Securonix/Scripts/UpdateSecuronixIncidentStatus/UpdateSecuronixIncidentStatus.yml index 237a08aba30..5071565dc41 100644 --- a/Packs/Securonix/Scripts/UpdateSecuronixIncidentStatus/UpdateSecuronixIncidentStatus.yml +++ b/Packs/Securonix/Scripts/UpdateSecuronixIncidentStatus/UpdateSecuronixIncidentStatus.yml @@ -30,7 +30,7 @@ dependson: must: - '|||securonix-xsoar-state-mapping-get' - '|||securonix-add-comment-to-incident' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/Securonix/pack_metadata.json b/Packs/Securonix/pack_metadata.json index e62ab9ba001..ffc75518892 100644 --- a/Packs/Securonix/pack_metadata.json +++ b/Packs/Securonix/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Securonix", "description": "Use the Securonix integration to manage incidents, threats, lookup tables, whitelists and watchlists.", "support": "partner", - "currentVersion": "2.0.21", + "currentVersion": "2.0.22", "author": "Securonix", "url": "https://www.securonix.com", "email": "support@securonix.com", diff --git a/Packs/Sepio/Integrations/SepioPrimeAPI/SepioPrimeAPI.yml b/Packs/Sepio/Integrations/SepioPrimeAPI/SepioPrimeAPI.yml index 178dc462b32..ac48dcfc0fd 100644 --- a/Packs/Sepio/Integrations/SepioPrimeAPI/SepioPrimeAPI.yml +++ b/Packs/Sepio/Integrations/SepioPrimeAPI/SepioPrimeAPI.yml @@ -426,7 +426,7 @@ script: description: New mode to apply – "Approve" or "Disapprove". description: Set Agent Peripherals Mode execution: true - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Sepio/ReleaseNotes/1_0_9.md b/Packs/Sepio/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..fb7f2ace074 --- /dev/null +++ b/Packs/Sepio/ReleaseNotes/1_0_9.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Sepio + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Sepio/pack_metadata.json b/Packs/Sepio/pack_metadata.json index 954814cf527..e1d8225fc3a 100644 --- a/Packs/Sepio/pack_metadata.json +++ b/Packs/Sepio/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Sepio", "description": "Get Agent, Switches and Events from your Sepio Prime", "support": "partner", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Sepio", "url": "https://sepio.systems/contact-us/", "email": "support@sepio.systems", diff --git a/Packs/SingleConnect/Integrations/SingleConnect/SingleConnect.yml b/Packs/SingleConnect/Integrations/SingleConnect/SingleConnect.yml index b1563b1effc..53f8f75f12f 100644 --- a/Packs/SingleConnect/Integrations/SingleConnect/SingleConnect.yml +++ b/Packs/SingleConnect/Integrations/SingleConnect/SingleConnect.yml @@ -269,7 +269,7 @@ script: - contextPath: SingleConnect.SapmAccount.groupFullPath description: The full path of the SAPM group that the account is under. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/SingleConnect/ReleaseNotes/1_0_16.md b/Packs/SingleConnect/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..8c02f32dbed --- /dev/null +++ b/Packs/SingleConnect/ReleaseNotes/1_0_16.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Single Connect +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/SingleConnect/pack_metadata.json b/Packs/SingleConnect/pack_metadata.json index a92d1755b5e..678586cfd9b 100644 --- a/Packs/SingleConnect/pack_metadata.json +++ b/Packs/SingleConnect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Single Connect", "description": "Single Connect enables enterprises to remove static passwords stored in applications by instead keeping passwords in a secure password vault. It secures access to passwords through token-based authentication", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Krontech", "url": "https://kron.com.tr/en/single-connect", "email": "", diff --git a/Packs/Sixgill-Darkfeed/ReleaseNotes/2_2_24.md b/Packs/Sixgill-Darkfeed/ReleaseNotes/2_2_24.md new file mode 100644 index 00000000000..954ac3228c6 --- /dev/null +++ b/Packs/Sixgill-Darkfeed/ReleaseNotes/2_2_24.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### SixgillSearchIndicators + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Sixgill-Darkfeed/Scripts/SixgillSearchIndicators/SixgillSearchIndicators.yml b/Packs/Sixgill-Darkfeed/Scripts/SixgillSearchIndicators/SixgillSearchIndicators.yml index 32c872c5fc1..938c807ee46 100644 --- a/Packs/Sixgill-Darkfeed/Scripts/SixgillSearchIndicators/SixgillSearchIndicators.yml +++ b/Packs/Sixgill-Darkfeed/Scripts/SixgillSearchIndicators/SixgillSearchIndicators.yml @@ -20,6 +20,6 @@ outputs: description: Indicators Found scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.5.0 diff --git a/Packs/Sixgill-Darkfeed/pack_metadata.json b/Packs/Sixgill-Darkfeed/pack_metadata.json index b70472a62ea..0297d199e11 100644 --- a/Packs/Sixgill-Darkfeed/pack_metadata.json +++ b/Packs/Sixgill-Darkfeed/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Sixgill Darkfeed - Annual Subscription", "description": "This edition of Sixgill Darkfeed is intended for customers who have a direct annual subscription to Sixgill Darkfeed.\n\nGet contextual and actionable insights to proactively block underground threats in real-time with the most comprehensive, automated stream of IOCs \n\nFor organizations who are currently Darkfeed customers.", "support": "partner", - "currentVersion": "2.2.23", + "currentVersion": "2.2.24", "author": "Cybersixgill", "url": "", "email": "sales@cybersixgill.com", diff --git a/Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/SlashNextPhishingIncidentResponse.yml b/Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/SlashNextPhishingIncidentResponse.yml index b59e54d1af7..7bdc56d8967 100644 --- a/Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/SlashNextPhishingIncidentResponse.yml +++ b/Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/SlashNextPhishingIncidentResponse.yml @@ -54,7 +54,7 @@ configuration: type: 1 required: false script: - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 type: python subtype: python3 script: '-' diff --git a/Packs/SlashNextPhishingIncidentResponse/ReleaseNotes/1_3_10.md b/Packs/SlashNextPhishingIncidentResponse/ReleaseNotes/1_3_10.md new file mode 100644 index 00000000000..08496396eb3 --- /dev/null +++ b/Packs/SlashNextPhishingIncidentResponse/ReleaseNotes/1_3_10.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### SlashNext Phishing Incident Response + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### BrandImpersonationDetection + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SlashNextPhishingIncidentResponse/Scripts/BrandImpersonationDetection/BrandImpersonationDetection.yml b/Packs/SlashNextPhishingIncidentResponse/Scripts/BrandImpersonationDetection/BrandImpersonationDetection.yml index d852fb220d5..c07b620fc5b 100644 --- a/Packs/SlashNextPhishingIncidentResponse/Scripts/BrandImpersonationDetection/BrandImpersonationDetection.yml +++ b/Packs/SlashNextPhishingIncidentResponse/Scripts/BrandImpersonationDetection/BrandImpersonationDetection.yml @@ -6,7 +6,7 @@ comment: Analyzes the forensic data to detect brand impersonation attacks. This commonfields: id: BrandImpersonationDetection version: -1 -dockerimage: demisto/python3:3.10.14.95956 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: BrandImpersonationDetection outputs: diff --git a/Packs/SlashNextPhishingIncidentResponse/pack_metadata.json b/Packs/SlashNextPhishingIncidentResponse/pack_metadata.json index 58457a98160..a8f2c9296b1 100644 --- a/Packs/SlashNextPhishingIncidentResponse/pack_metadata.json +++ b/Packs/SlashNextPhishingIncidentResponse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SlashNext Phishing Incident Response - Annual Subscription (Direct Subscription)", "description": "This community edition of SlashNext Phishing Incident Response is intended for organization to try the world’s largest, real-time phishing intelligence database for accurate, definitive binary verdicts on suspicious URLs and download phishing forensics including webpage screenshots, HTML and text. \n\nThis edition is for organizations that need a direct annual subscription to SlashNext Phishing Incident Response, the world’s largest, real-time phishing intelligence database for accurate, definitive binary verdicts on suspicious URLs and download phishing forensics including webpage screenshots, HTML and text. \n\nFor more information go to: https://www.slashnext.com/technology-partners/cortex-xsoar/", "support": "partner", - "currentVersion": "1.3.9", + "currentVersion": "1.3.10", "author": "SlashNext", "url": "https://www.slashnext.com", "email": "support@slashnext.com", diff --git a/Packs/Spamcop/Integrations/Spamcop/Spamcop.yml b/Packs/Spamcop/Integrations/Spamcop/Spamcop.yml index 5ccc2a651e6..1046b1fe273 100644 --- a/Packs/Spamcop/Integrations/Spamcop/Spamcop.yml +++ b/Packs/Spamcop/Integrations/Spamcop/Spamcop.yml @@ -72,7 +72,7 @@ script: description: A description explaining why the IP address was reported as malicious. type: string description: Get IP details from Spamcop service. - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Spamcop/ReleaseNotes/1_0_9.md b/Packs/Spamcop/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..bcf7b96775b --- /dev/null +++ b/Packs/Spamcop/ReleaseNotes/1_0_9.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Spamcop + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Spamcop/pack_metadata.json b/Packs/Spamcop/pack_metadata.json index 2f3081ddd94..9a3dc595538 100644 --- a/Packs/Spamcop/pack_metadata.json +++ b/Packs/Spamcop/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Spamcop", "description": "SpamCop is an email spam reporting service, integration allow checking the reputation of an IP address", "support": "community", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Harri Ruuttila", "url": "", "email": "harri@ruuttila.com", diff --git a/Packs/SpurContextAPI/Integrations/SpurContextAPI/SpurContextAPI.yml b/Packs/SpurContextAPI/Integrations/SpurContextAPI/SpurContextAPI.yml index dd4f6364d46..ecbb33d7ce7 100644 --- a/Packs/SpurContextAPI/Integrations/SpurContextAPI/SpurContextAPI.yml +++ b/Packs/SpurContextAPI/Integrations/SpurContextAPI/SpurContextAPI.yml @@ -185,7 +185,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.89873 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) \ No newline at end of file diff --git a/Packs/SpurContextAPI/ReleaseNotes/1_0_3.md b/Packs/SpurContextAPI/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..29c77247734 --- /dev/null +++ b/Packs/SpurContextAPI/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SpurContextAPI + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SpurContextAPI/pack_metadata.json b/Packs/SpurContextAPI/pack_metadata.json index 10bf19a0ca3..f2054a36a2e 100644 --- a/Packs/SpurContextAPI/pack_metadata.json +++ b/Packs/SpurContextAPI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Spur Context API", "description": "Enrich IP addresses with data from the Spur Context API", "support": "partner", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Spur Intelligence Corporation", "url": "https://spur.us/contact/", "email": "support@spur.us", diff --git a/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionEnrichment/SpyCloudEnterpriseProtectionEnrichment.yml b/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionEnrichment/SpyCloudEnterpriseProtectionEnrichment.yml index 004bd211e02..4efccae89ed 100644 --- a/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionEnrichment/SpyCloudEnterpriseProtectionEnrichment.yml +++ b/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionEnrichment/SpyCloudEnterpriseProtectionEnrichment.yml @@ -1835,7 +1835,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionFeed/SpyCloudEnterpriseProtectionFeed.yml b/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionFeed/SpyCloudEnterpriseProtectionFeed.yml index 6bbf197d75d..9dc2de22bbb 100644 --- a/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionFeed/SpyCloudEnterpriseProtectionFeed.yml +++ b/Packs/SpyCloudEnterpriseProtection/Integrations/SpyCloudEnterpriseProtectionFeed/SpyCloudEnterpriseProtectionFeed.yml @@ -125,7 +125,7 @@ script: type: python subtype: python3 isfetch: true - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/SpyCloudEnterpriseProtection/ReleaseNotes/1_0_3.md b/Packs/SpyCloudEnterpriseProtection/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..c2331cadcbb --- /dev/null +++ b/Packs/SpyCloudEnterpriseProtection/ReleaseNotes/1_0_3.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### SpyCloud Enterprise Protection Enrichment + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### SpyCloud Enterprise Protection Feed + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SpyCloudEnterpriseProtection/pack_metadata.json b/Packs/SpyCloudEnterpriseProtection/pack_metadata.json index 208c7378df8..e109c6f1ee9 100644 --- a/Packs/SpyCloudEnterpriseProtection/pack_metadata.json +++ b/Packs/SpyCloudEnterpriseProtection/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SpyCloud Enterprise Protection", "description": "Create breach and malware incidents in Cortex® XSOAR™ using the SpyCloud Enterprise Protection API. Provide enrichment for domains, IPs, emails, usernames, and passwords.", "support": "partner", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "SpyCloud", "url": "https://portal.spycloud.com", "email": "integrations@spycloud.com", diff --git a/Packs/Stairwell/Integrations/Inception/Inception.yml b/Packs/Stairwell/Integrations/Inception/Inception.yml index aacb8cb2bb2..07d0d2033f7 100644 --- a/Packs/Stairwell/Integrations/Inception/Inception.yml +++ b/Packs/Stairwell/Integrations/Inception/Inception.yml @@ -48,7 +48,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - No tests (auto formatted) diff --git a/Packs/Stairwell/ReleaseNotes/1_0_17.md b/Packs/Stairwell/ReleaseNotes/1_0_17.md new file mode 100644 index 00000000000..57a6007e8d1 --- /dev/null +++ b/Packs/Stairwell/ReleaseNotes/1_0_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Stairwell Inception + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Stairwell/pack_metadata.json b/Packs/Stairwell/pack_metadata.json index 7d3e9c257c1..f473c9085f4 100644 --- a/Packs/Stairwell/pack_metadata.json +++ b/Packs/Stairwell/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Stairwell", "description": "Inception is a security intelligence engine that automates the continuous capture, storage, and analysis of executable files.", "support": "partner", - "currentVersion": "1.0.16", + "currentVersion": "1.0.17", "author": "Stairwell", "url": "https://www.stairwell.com", "email": "support@stairwell.com", @@ -30,5 +30,7 @@ "xsoar", "marketplacev2" ], - "githubUser": ["mikewilusz-stairwell"] -} + "githubUser": [ + "mikewilusz-stairwell" + ] +} \ No newline at end of file diff --git a/Packs/SumoLogic_Cloud_SIEM/ReleaseNotes/1_1_26.md b/Packs/SumoLogic_Cloud_SIEM/ReleaseNotes/1_1_26.md new file mode 100644 index 00000000000..e33509ef14b --- /dev/null +++ b/Packs/SumoLogic_Cloud_SIEM/ReleaseNotes/1_1_26.md @@ -0,0 +1,9 @@ + +#### Scripts + +##### SumoLogicCloseLinkSignalIncidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### SumoLogicLinkSignalIncidents + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicCloseLinkSignalIncidents/SumoLogicCloseLinkSignalIncidents.yml b/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicCloseLinkSignalIncidents/SumoLogicCloseLinkSignalIncidents.yml index 8f0dd77b008..80a3f36498f 100644 --- a/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicCloseLinkSignalIncidents/SumoLogicCloseLinkSignalIncidents.yml +++ b/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicCloseLinkSignalIncidents/SumoLogicCloseLinkSignalIncidents.yml @@ -6,7 +6,7 @@ comment: Close the linked signal incidents when the main Insight incident is clo commonfields: id: SumoLogicCloseLinkSignalIncidents version: -1 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: SumoLogicCloseLinkSignalIncidents runas: DBotWeakRole diff --git a/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicLinkSignalIncidents/SumoLogicLinkSignalIncidents.yml b/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicLinkSignalIncidents/SumoLogicLinkSignalIncidents.yml index 8eb20a03b90..97945621759 100644 --- a/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicLinkSignalIncidents/SumoLogicLinkSignalIncidents.yml +++ b/Packs/SumoLogic_Cloud_SIEM/Scripts/SumoLogicLinkSignalIncidents/SumoLogicLinkSignalIncidents.yml @@ -5,7 +5,7 @@ comment: "Command to link associated Signal Incidents to the Insight Incident." commonfields: id: SumoLogicLinkSignalIncidents version: -1 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: SumoLogicLinkSignalIncidents runas: DBotWeakRole diff --git a/Packs/SumoLogic_Cloud_SIEM/pack_metadata.json b/Packs/SumoLogic_Cloud_SIEM/pack_metadata.json index 57ecf486459..d431752034e 100644 --- a/Packs/SumoLogic_Cloud_SIEM/pack_metadata.json +++ b/Packs/SumoLogic_Cloud_SIEM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Sumo Logic Cloud SIEM", "description": "Sumo Logic Cloud SIEM provides threat detection and incident response for modern IT environments. This content pack will allow you to apply automation to perform actual SOC analyst workflows. Using this content pack you will be able to fetch Incidents via Insights, update status of an Insight, add items to match list, add Threat Intel Indicators to Threat Intel Sources, and so on.", "support": "partner", - "currentVersion": "1.1.25", + "currentVersion": "1.1.26", "author": "Sumo Logic", "url": "https://www.sumologic.com/solutions/cloud-siem-enterprise/", "email": "support@sumologic.com", @@ -19,4 +19,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/SuspiciousDomainHunting/ReleaseNotes/1_0_8.md b/Packs/SuspiciousDomainHunting/ReleaseNotes/1_0_8.md new file mode 100644 index 00000000000..6cbac4e754f --- /dev/null +++ b/Packs/SuspiciousDomainHunting/ReleaseNotes/1_0_8.md @@ -0,0 +1,15 @@ + +#### Scripts + +##### SSIMScoreWidget + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### displaySiteCategory + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### MSEScoreWidget + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### HtmlPhishingCheck + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/SuspiciousDomainHunting/Scripts/DisplaySiteCategory/DisplaySiteCategory.yml b/Packs/SuspiciousDomainHunting/Scripts/DisplaySiteCategory/DisplaySiteCategory.yml index 7d7b259d547..0aa8cd05dc7 100644 --- a/Packs/SuspiciousDomainHunting/Scripts/DisplaySiteCategory/DisplaySiteCategory.yml +++ b/Packs/SuspiciousDomainHunting/Scripts/DisplaySiteCategory/DisplaySiteCategory.yml @@ -11,7 +11,7 @@ enabled: true scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.98471 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} tests: diff --git a/Packs/SuspiciousDomainHunting/Scripts/HTMLphishingcheck/HTMLphishingcheck.yml b/Packs/SuspiciousDomainHunting/Scripts/HTMLphishingcheck/HTMLphishingcheck.yml index b4bf2b61604..db3b37ff70e 100644 --- a/Packs/SuspiciousDomainHunting/Scripts/HTMLphishingcheck/HTMLphishingcheck.yml +++ b/Packs/SuspiciousDomainHunting/Scripts/HTMLphishingcheck/HTMLphishingcheck.yml @@ -11,7 +11,7 @@ enabled: true scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.99474 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} tests: diff --git a/Packs/SuspiciousDomainHunting/Scripts/MSEScoreWidget/MSEScoreWidget.yml b/Packs/SuspiciousDomainHunting/Scripts/MSEScoreWidget/MSEScoreWidget.yml index 64185530aa4..fbe98f38abc 100644 --- a/Packs/SuspiciousDomainHunting/Scripts/MSEScoreWidget/MSEScoreWidget.yml +++ b/Packs/SuspiciousDomainHunting/Scripts/MSEScoreWidget/MSEScoreWidget.yml @@ -11,7 +11,7 @@ enabled: true scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} fromversion: 6.10.0 diff --git a/Packs/SuspiciousDomainHunting/Scripts/SSIMScoreWidget/SSIMScoreWidget.yml b/Packs/SuspiciousDomainHunting/Scripts/SSIMScoreWidget/SSIMScoreWidget.yml index 078cb9c7448..d4f0032e10a 100644 --- a/Packs/SuspiciousDomainHunting/Scripts/SSIMScoreWidget/SSIMScoreWidget.yml +++ b/Packs/SuspiciousDomainHunting/Scripts/SSIMScoreWidget/SSIMScoreWidget.yml @@ -11,7 +11,7 @@ enabled: true scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} fromversion: 6.10.0 diff --git a/Packs/SuspiciousDomainHunting/pack_metadata.json b/Packs/SuspiciousDomainHunting/pack_metadata.json index 33070ad1f1a..e378d4b0125 100644 --- a/Packs/SuspiciousDomainHunting/pack_metadata.json +++ b/Packs/SuspiciousDomainHunting/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Suspicious Domain Hunting", "description": "This pack provides all the necessary tools for the Suspicious Domain Hunting use case. It uses the CertStream integration to ingest new SSL certificates and alert for type-squatting domains with SSL certificate, these alerts are then analyzed and mitigated.", "support": "community", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "Cortex XSOAR", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Tessian/Integrations/Tessian/Tessian.yml b/Packs/Tessian/Integrations/Tessian/Tessian.yml index ce7b0f88c93..769667a1945 100644 --- a/Packs/Tessian/Integrations/Tessian/Tessian.yml +++ b/Packs/Tessian/Integrations/Tessian/Tessian.yml @@ -110,7 +110,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/Tessian/ReleaseNotes/1_0_5.md b/Packs/Tessian/ReleaseNotes/1_0_5.md new file mode 100644 index 00000000000..bf068fb6ce7 --- /dev/null +++ b/Packs/Tessian/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Tessian + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Tessian/pack_metadata.json b/Packs/Tessian/pack_metadata.json index 192f113972a..a9451a7b20d 100644 --- a/Packs/Tessian/pack_metadata.json +++ b/Packs/Tessian/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Tessian", "description": "Tessian's complete cloud email security platform defends customers against advanced phishing threats, and protects their sensitive data on email.", "support": "partner", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Tessian", "url": "", "email": "support@tessian.com", @@ -25,4 +25,4 @@ "NicBunn-PlutoFlume", "nicokuyum-PlutoFlume" ] -} +} \ No newline at end of file diff --git a/Packs/ThreatZone/Integrations/ThreatZone/ThreatZone.yml b/Packs/ThreatZone/Integrations/ThreatZone/ThreatZone.yml index e6a837d37ef..f04a6d8a616 100644 --- a/Packs/ThreatZone/Integrations/ThreatZone/ThreatZone.yml +++ b/Packs/ThreatZone/Integrations/ThreatZone/ThreatZone.yml @@ -322,7 +322,7 @@ script: - contextPath: ThreatZone.Limits.Daily_Submission_Limit description: The remaining/total daily submission limits of the current plan. type: String - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 fromversion: 6.9.0 diff --git a/Packs/ThreatZone/ReleaseNotes/1_0_4.md b/Packs/ThreatZone/ReleaseNotes/1_0_4.md new file mode 100644 index 00000000000..a53fc77dbdb --- /dev/null +++ b/Packs/ThreatZone/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ThreatZone + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ThreatZone/pack_metadata.json b/Packs/ThreatZone/pack_metadata.json index 020de816913..4e52b7ca49a 100644 --- a/Packs/ThreatZone/pack_metadata.json +++ b/Packs/ThreatZone/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ThreatZone", "description": "ThreatZone malware analysis sandboxing", "support": "partner", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Malwation", "url": "https://app.threat.zone", "email": "info@malwation.com", diff --git a/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml b/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml index 603ef7884e5..218c0b13b49 100644 --- a/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml +++ b/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml @@ -86,7 +86,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 marketplaces: - marketplacev2 diff --git a/Packs/TrendMicroVisionOne/ReleaseNotes/4_1_5.md b/Packs/TrendMicroVisionOne/ReleaseNotes/4_1_5.md new file mode 100644 index 00000000000..bd2ab9b71c4 --- /dev/null +++ b/Packs/TrendMicroVisionOne/ReleaseNotes/4_1_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Trend Micro Vision One Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/TrendMicroVisionOne/pack_metadata.json b/Packs/TrendMicroVisionOne/pack_metadata.json index 9b05850759d..f357c895c1a 100644 --- a/Packs/TrendMicroVisionOne/pack_metadata.json +++ b/Packs/TrendMicroVisionOne/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Trend Micro Vision One", "description": "Trend Micro Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response(XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Micro Vision One prevents the majority of attacks with automated protection.", "support": "partner", - "currentVersion": "4.1.4", + "currentVersion": "4.1.5", "serverMinVersion": "6.2.0", "author": "Trend Micro", "url": "https://success.trendmicro.com", diff --git a/Packs/TrustwaveFusion/Integrations/TrustwaveFusion/TrustwaveFusion.yml b/Packs/TrustwaveFusion/Integrations/TrustwaveFusion/TrustwaveFusion.yml index 428d46c4b4f..cbc4fa3f2f8 100644 --- a/Packs/TrustwaveFusion/Integrations/TrustwaveFusion/TrustwaveFusion.yml +++ b/Packs/TrustwaveFusion/Integrations/TrustwaveFusion/TrustwaveFusion.yml @@ -666,7 +666,7 @@ script: - contextPath: Trustwave.Asset.uri description: 'URI of the asset.' type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/TrustwaveFusion/ReleaseNotes/1_0_13.md b/Packs/TrustwaveFusion/ReleaseNotes/1_0_13.md new file mode 100644 index 00000000000..da68ea81b16 --- /dev/null +++ b/Packs/TrustwaveFusion/ReleaseNotes/1_0_13.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### TrustwaveFusion + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/TrustwaveFusion/pack_metadata.json b/Packs/TrustwaveFusion/pack_metadata.json index 54d4e94e627..5b8a98e2f8d 100644 --- a/Packs/TrustwaveFusion/pack_metadata.json +++ b/Packs/TrustwaveFusion/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Trustwave Fusion", "description": "Trustwave Fusion is Trustwave's cloud-native platform that provides visibility and context in detection and response workflows.", "support": "partner", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Trustwave", "url": "https://www.trustwave.com/en_us/company/support/", "email": "support@trustwave.com", @@ -12,9 +12,11 @@ "tags": [], "useCases": [], "keywords": [], - "githubUser": [ "cforbes-tw" ], + "githubUser": [ + "cforbes-tw" + ], "marketplaces": [ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/Twinwave/Integrations/Twinwave/Twinwave.yml b/Packs/Twinwave/Integrations/Twinwave/Twinwave.yml index c499f05b5dd..b315ee44d84 100644 --- a/Packs/Twinwave/Integrations/Twinwave/Twinwave.yml +++ b/Packs/Twinwave/Integrations/Twinwave/Twinwave.yml @@ -240,7 +240,7 @@ script: - contextPath: Twinwave.TempArtifactURL.URL description: Temporary URL. type: Unknown - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/Twinwave/ReleaseNotes/1_0_10.md b/Packs/Twinwave/ReleaseNotes/1_0_10.md new file mode 100644 index 00000000000..34dbc9dba52 --- /dev/null +++ b/Packs/Twinwave/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Twinwave + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Twinwave/pack_metadata.json b/Packs/Twinwave/pack_metadata.json index fd713731987..82f9943481b 100644 --- a/Packs/Twinwave/pack_metadata.json +++ b/Packs/Twinwave/pack_metadata.json @@ -3,7 +3,7 @@ "description": "TwinWave's threat analysis platform analyzes both URLs and files to detect credential phishing and malware threats. Our platform automatically navigates complex attack chains that attackers put in front of threats in order to evade analysis. In addition to detecting threats, the TwinWave platform generates actionable intelligence for threat hunting and other activities.", "support": "partner", "certification": "certified", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Twinwave", "url": "", "email": "support@twinwave.io", diff --git a/Packs/Use_Case_Builder/ReleaseNotes/1_0_9.md b/Packs/Use_Case_Builder/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..b85eddd324e --- /dev/null +++ b/Packs/Use_Case_Builder/ReleaseNotes/1_0_9.md @@ -0,0 +1,7 @@ + +#### Scripts + +##### UseCasePlaybookAutoGenerator +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/Use_Case_Builder/Scripts/UseCasePlaybookAutoGenerator/UseCasePlaybookAutoGenerator.yml b/Packs/Use_Case_Builder/Scripts/UseCasePlaybookAutoGenerator/UseCasePlaybookAutoGenerator.yml index 6390a5c5032..647105bfe9f 100644 --- a/Packs/Use_Case_Builder/Scripts/UseCasePlaybookAutoGenerator/UseCasePlaybookAutoGenerator.yml +++ b/Packs/Use_Case_Builder/Scripts/UseCasePlaybookAutoGenerator/UseCasePlaybookAutoGenerator.yml @@ -5,7 +5,7 @@ contentitemexportablefields: contentitemfields: fromServerVersion: "" comment: '' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: UseCasePlaybookAutoGenerator runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/pack_metadata.json b/Packs/Use_Case_Builder/pack_metadata.json index 6d6eda1bfdf..6847d56a5d2 100644 --- a/Packs/Use_Case_Builder/pack_metadata.json +++ b/Packs/Use_Case_Builder/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Use Case Builder", "description": "To streamline the Use Case Design process and provide tools to help you get into production faster!", "support": "community", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Joe Cosgrove", "url": "https://www.paloaltonetworks.com/cortex", "email": "jcosgrove@paloaltonetworks.com", diff --git a/Packs/VMRay/Integrations/VMRay/VMRay.yml b/Packs/VMRay/Integrations/VMRay/VMRay.yml index bc440a871be..749bb02e097 100644 --- a/Packs/VMRay/Integrations/VMRay/VMRay.yml +++ b/Packs/VMRay/Integrations/VMRay/VMRay.yml @@ -1162,7 +1162,7 @@ script: description: Percentages used. type: Number arguments: [] - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/VMRay/ReleaseNotes/1_1_16.md b/Packs/VMRay/ReleaseNotes/1_1_16.md new file mode 100644 index 00000000000..549dac827e8 --- /dev/null +++ b/Packs/VMRay/ReleaseNotes/1_1_16.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### VMRay + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/VMRay/pack_metadata.json b/Packs/VMRay/pack_metadata.json index 3dc4b21d3d3..e5f85f61e0a 100644 --- a/Packs/VMRay/pack_metadata.json +++ b/Packs/VMRay/pack_metadata.json @@ -2,7 +2,7 @@ "name": "VMRay Analyzer", "description": "Analyze files and URLs using the VMRay Platform for accurate threat intelligence and high-quality IOCs.", "support": "partner", - "currentVersion": "1.1.15", + "currentVersion": "1.1.16", "author": "VMRay", "url": "https://www.vmray.com/", "email": "support@vmray.com", diff --git a/Packs/VaronisSaaS/Integrations/VaronisSaaS/VaronisSaaS.yml b/Packs/VaronisSaaS/Integrations/VaronisSaaS/VaronisSaaS.yml index 3ac5819d9eb..8e97cc88f62 100644 --- a/Packs/VaronisSaaS/Integrations/VaronisSaaS/VaronisSaaS.yml +++ b/Packs/VaronisSaaS/Integrations/VaronisSaaS/VaronisSaaS.yml @@ -523,7 +523,7 @@ script: name: get-mapping-fields - description: Updates the remote incident with local incident changes. This method is only used for debugging purposes and will not update the current incident. name: update-remote-system - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 feed: false isfetch: true ismappable: true diff --git a/Packs/VaronisSaaS/ReleaseNotes/1_0_9.md b/Packs/VaronisSaaS/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..3e1d6aa7fde --- /dev/null +++ b/Packs/VaronisSaaS/ReleaseNotes/1_0_9.md @@ -0,0 +1,14 @@ + +#### Integrations + +##### Varonis SaaS +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +#### Scripts + +##### varonis-alert-post-processing +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/VaronisSaaS/Scripts/varonisalertpostprocessing/varonisalertpostprocessing.yml b/Packs/VaronisSaaS/Scripts/varonisalertpostprocessing/varonisalertpostprocessing.yml index bdeeac4f38e..9e89b8276bf 100644 --- a/Packs/VaronisSaaS/Scripts/varonisalertpostprocessing/varonisalertpostprocessing.yml +++ b/Packs/VaronisSaaS/Scripts/varonisalertpostprocessing/varonisalertpostprocessing.yml @@ -10,5 +10,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.14.92207 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 diff --git a/Packs/VaronisSaaS/pack_metadata.json b/Packs/VaronisSaaS/pack_metadata.json index 42a70484059..afe6077ddff 100644 --- a/Packs/VaronisSaaS/pack_metadata.json +++ b/Packs/VaronisSaaS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Varonis SaaS", "description": "Streamline alerts, events and related forensic information from Varonis SaaS", "support": "partner", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Varonis", "url": "https://www.varonis.com/support", "email": "", diff --git a/Packs/VectraXDR/Integrations/VectraXDR/VectraXDR.yml b/Packs/VectraXDR/Integrations/VectraXDR/VectraXDR.yml index faa2c78a0d7..13efdd7ac00 100644 --- a/Packs/VectraXDR/Integrations/VectraXDR/VectraXDR.yml +++ b/Packs/VectraXDR/Integrations/VectraXDR/VectraXDR.yml @@ -2168,7 +2168,7 @@ script: - contextPath: Vectra.Group.rules.description description: Description of the rule. type: String - dockerimage: demisto/python3:3.10.14.96411 + dockerimage: demisto/python3:3.11.10.115186 feed: false isfetch: true isremotesyncin: true diff --git a/Packs/VectraXDR/ReleaseNotes/1_0_7.md b/Packs/VectraXDR/ReleaseNotes/1_0_7.md new file mode 100644 index 00000000000..c164458bd38 --- /dev/null +++ b/Packs/VectraXDR/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Vectra XDR + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/VectraXDR/pack_metadata.json b/Packs/VectraXDR/pack_metadata.json index c0728fcf6e6..3943386d2db 100644 --- a/Packs/VectraXDR/pack_metadata.json +++ b/Packs/VectraXDR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Vectra XDR", "description": "Vectra XDR pack empowers the SOC to create incidents using Vectra AI's Attack Signal Intelligence.", "support": "partner", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Vectra AI", "url": "https://support.vectra.ai", "email": "support@vectra.ai", diff --git a/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml b/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml index 4eee5821671..7dcd8ea57ba 100644 --- a/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml +++ b/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml @@ -57,7 +57,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 marketplaces: - marketplacev2 fromversion: 6.10.0 diff --git a/Packs/Vectra_AI/ReleaseNotes/2_0_1.md b/Packs/Vectra_AI/ReleaseNotes/2_0_1.md new file mode 100644 index 00000000000..ee01248cb51 --- /dev/null +++ b/Packs/Vectra_AI/ReleaseNotes/2_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Vectra AI Event Collector + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Vectra_AI/pack_metadata.json b/Packs/Vectra_AI/pack_metadata.json index 8e0a72b3b07..7cae9750677 100644 --- a/Packs/Vectra_AI/pack_metadata.json +++ b/Packs/Vectra_AI/pack_metadata.json @@ -4,7 +4,7 @@ "Network Security" ], "created": "2022-06-27T10:00:00Z", - "currentVersion": "2.0.0", + "currentVersion": "2.0.1", "description": "This content pack allows to create incidents based on Vectra Accounts/Hosts/Detections objects.", "devEmail": [ "tme@vectra.ai" diff --git a/Packs/VirusTotal/Integrations/FeedLivehunt/FeedLivehunt.yml b/Packs/VirusTotal/Integrations/FeedLivehunt/FeedLivehunt.yml index 963dda970a7..93743db3ffd 100644 --- a/Packs/VirusTotal/Integrations/FeedLivehunt/FeedLivehunt.yml +++ b/Packs/VirusTotal/Integrations/FeedLivehunt/FeedLivehunt.yml @@ -104,7 +104,7 @@ script: name: vt-livehunt-get-indicators - description: 'This command will reset your fetch history.' name: vt-reset-fetch-indicators - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/VirusTotal/Integrations/FeedRetrohunt/FeedRetrohunt.yml b/Packs/VirusTotal/Integrations/FeedRetrohunt/FeedRetrohunt.yml index 2abecdf072b..bdc7512c7a4 100644 --- a/Packs/VirusTotal/Integrations/FeedRetrohunt/FeedRetrohunt.yml +++ b/Packs/VirusTotal/Integrations/FeedRetrohunt/FeedRetrohunt.yml @@ -100,7 +100,7 @@ script: name: vt-retrohunt-get-indicators - description: "This command will reset your fetch history." name: vt-retrohunt-reset-fetch-indicators - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: "-" diff --git a/Packs/VirusTotal/Integrations/VirusTotal_V3_Premium/VirusTotal_V3_Premium.yml b/Packs/VirusTotal/Integrations/VirusTotal_V3_Premium/VirusTotal_V3_Premium.yml index 4f0098b07af..fd077e4c55e 100644 --- a/Packs/VirusTotal/Integrations/VirusTotal_V3_Premium/VirusTotal_V3_Premium.yml +++ b/Packs/VirusTotal/Integrations/VirusTotal_V3_Premium/VirusTotal_V3_Premium.yml @@ -1478,7 +1478,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 defaultmapperin: VirusTotal Intelligence LiveHunt Notification fromversion: 5.5.0 tests: diff --git a/Packs/VirusTotal/ReleaseNotes/2_6_25.md b/Packs/VirusTotal/ReleaseNotes/2_6_25.md new file mode 100644 index 00000000000..31b6c7a8943 --- /dev/null +++ b/Packs/VirusTotal/ReleaseNotes/2_6_25.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### VirusTotal Livehunt Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### VirusTotal - Premium (API v3) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### VirusTotal Retrohunt Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/VirusTotal/pack_metadata.json b/Packs/VirusTotal/pack_metadata.json index 474f41e60f4..afeb97c5d31 100644 --- a/Packs/VirusTotal/pack_metadata.json +++ b/Packs/VirusTotal/pack_metadata.json @@ -2,7 +2,7 @@ "name": "VirusTotal", "description": "Analyze suspicious hashes, URLs, domains and IP addresses", "support": "partner", - "currentVersion": "2.6.24", + "currentVersion": "2.6.25", "author": "VirusTotal", "url": "https://www.virustotal.com", "email": "contact@virustotal.com", diff --git a/Packs/WootCloud/Integrations/WootCloud/WootCloud.yml b/Packs/WootCloud/Integrations/WootCloud/WootCloud.yml index 19fcf942d23..5c75a164d82 100644 --- a/Packs/WootCloud/Integrations/WootCloud/WootCloud.yml +++ b/Packs/WootCloud/Integrations/WootCloud/WootCloud.yml @@ -937,5 +937,5 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 diff --git a/Packs/WootCloud/ReleaseNotes/1_0_10.md b/Packs/WootCloud/ReleaseNotes/1_0_10.md new file mode 100644 index 00000000000..0766e27d5c6 --- /dev/null +++ b/Packs/WootCloud/ReleaseNotes/1_0_10.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### WootCloud +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/WootCloud/pack_metadata.json b/Packs/WootCloud/pack_metadata.json index 53ddab1d8cb..6da8d66b580 100644 --- a/Packs/WootCloud/pack_metadata.json +++ b/Packs/WootCloud/pack_metadata.json @@ -2,7 +2,7 @@ "name": "WootCloud", "description": "WootCloud HyperContext Powered Security", "support": "partner", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "WootCloud", "url": "https://wootcloud.com/contact/", "email": "support@wootcloud.com", diff --git a/Packs/XMCyber/Integrations/XMCyberIntegration/XMCyberIntegration.yml b/Packs/XMCyber/Integrations/XMCyberIntegration/XMCyberIntegration.yml index a82526bcbf0..28bd2602801 100644 --- a/Packs/XMCyber/Integrations/XMCyberIntegration/XMCyberIntegration.yml +++ b/Packs/XMCyber/Integrations/XMCyberIntegration/XMCyberIntegration.yml @@ -330,7 +330,7 @@ script: - contextPath: Host.IP description: The IP address of the host. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/XMCyber/ReleaseNotes/1_0_31.md b/Packs/XMCyber/ReleaseNotes/1_0_31.md new file mode 100644 index 00000000000..d2c77bbfeb3 --- /dev/null +++ b/Packs/XMCyber/ReleaseNotes/1_0_31.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### XM Cyber + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/XMCyber/pack_metadata.json b/Packs/XMCyber/pack_metadata.json index 4800336db63..5ec6067505d 100644 --- a/Packs/XMCyber/pack_metadata.json +++ b/Packs/XMCyber/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XM Cyber", "description": "The XM Cyber integration creates unique incidents with valuable data collected daily, and enriches your existing incidents with attack simulation context. This enables you to prioritize your responses based on XM Cyber's insights.", "support": "partner", - "currentVersion": "1.0.30", + "currentVersion": "1.0.31", "author": "XM Cyber", "url": "https://www.xmcyber.com", "email": "support@xmcyber.com", diff --git a/Packs/XMatters/ReleaseNotes/1_0_16.md b/Packs/XMatters/ReleaseNotes/1_0_16.md new file mode 100644 index 00000000000..4924d074838 --- /dev/null +++ b/Packs/XMatters/ReleaseNotes/1_0_16.md @@ -0,0 +1,9 @@ + +#### Scripts + +##### CloseTaskSetContext + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### WaitForKey + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/XMatters/Scripts/CloseTaskSetContext/CloseTaskSetContext.yml b/Packs/XMatters/Scripts/CloseTaskSetContext/CloseTaskSetContext.yml index 13dc09f65b2..3c80b3d53ee 100644 --- a/Packs/XMatters/Scripts/CloseTaskSetContext/CloseTaskSetContext.yml +++ b/Packs/XMatters/Scripts/CloseTaskSetContext/CloseTaskSetContext.yml @@ -22,7 +22,7 @@ args: description: The comments to place into the context. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 diff --git a/Packs/XMatters/Scripts/WaitForKey/WaitForKey.yml b/Packs/XMatters/Scripts/WaitForKey/WaitForKey.yml index aee65e67f54..602a227ec14 100644 --- a/Packs/XMatters/Scripts/WaitForKey/WaitForKey.yml +++ b/Packs/XMatters/Scripts/WaitForKey/WaitForKey.yml @@ -18,7 +18,7 @@ args: defaultValue: "10" scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/XMatters/pack_metadata.json b/Packs/XMatters/pack_metadata.json index 5f2986d2daf..1ff0e297911 100644 --- a/Packs/XMatters/pack_metadata.json +++ b/Packs/XMatters/pack_metadata.json @@ -2,7 +2,7 @@ "name": "xMatters", "description": "Use the xMatters pack to trigger events to on-call groups or users and wait for their response. Use their response to branch and take action in XSOAR.", "support": "partner", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "xMatters", "url": "https://support.xmatters.com/hc/en-us/requests/new", "email": "support@xmatters.com", diff --git a/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_9.md b/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_9.md new file mode 100644 index 00000000000..97bbb073ef7 --- /dev/null +++ b/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_9.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### ListInstalledContentPacks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/XSOARContentUpdateNotifications/Scripts/ListInstalledContentPacks/ListInstalledContentPacks.yml b/Packs/XSOARContentUpdateNotifications/Scripts/ListInstalledContentPacks/ListInstalledContentPacks.yml index 046e296ecf8..796b76f3c79 100644 --- a/Packs/XSOARContentUpdateNotifications/Scripts/ListInstalledContentPacks/ListInstalledContentPacks.yml +++ b/Packs/XSOARContentUpdateNotifications/Scripts/ListInstalledContentPacks/ListInstalledContentPacks.yml @@ -13,7 +13,7 @@ commonfields: dependson: must: - '|||core-api-get' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: ListInstalledContentPacks outputs: diff --git a/Packs/XSOARContentUpdateNotifications/pack_metadata.json b/Packs/XSOARContentUpdateNotifications/pack_metadata.json index 4dfee27111e..d5fee61ef76 100644 --- a/Packs/XSOARContentUpdateNotifications/pack_metadata.json +++ b/Packs/XSOARContentUpdateNotifications/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR Content Update Notifications", "description": "This pack will check for any available content updates for existing packs and send an e-mail or Slack message to users to inform them of the updates.", "support": "community", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Adam Burt and XSOAR Labs", "url": "", "email": "", diff --git a/Packs/XSOARFileManagement/Integrations/XSOARFileManagement/XSOARFileManagement.yml b/Packs/XSOARFileManagement/Integrations/XSOARFileManagement/XSOARFileManagement.yml index 7f77b735b8c..6fe95177e0b 100644 --- a/Packs/XSOARFileManagement/Integrations/XSOARFileManagement/XSOARFileManagement.yml +++ b/Packs/XSOARFileManagement/Integrations/XSOARFileManagement/XSOARFileManagement.yml @@ -148,7 +148,7 @@ script: description: Size of the file. type: string description: Get file hash from URI. - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/XSOARFileManagement/ReleaseNotes/1_1_3.md b/Packs/XSOARFileManagement/ReleaseNotes/1_1_3.md new file mode 100644 index 00000000000..0e618aeff7f --- /dev/null +++ b/Packs/XSOARFileManagement/ReleaseNotes/1_1_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### XSOAR File Management + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/XSOARFileManagement/pack_metadata.json b/Packs/XSOARFileManagement/pack_metadata.json index 261474a21e9..fd1c5d0343a 100644 --- a/Packs/XSOARFileManagement/pack_metadata.json +++ b/Packs/XSOARFileManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR File Management", "description": "This pack let user manipulate file inside XSOAR more easily than with the builtin functions.", "support": "community", - "currentVersion": "1.1.2", + "currentVersion": "1.1.3", "author": "Pierre", "url": "", "email": "", diff --git a/Packs/XSOAR_Engineer_Training/Integrations/XSOAREngineerTraining/XSOAREngineerTraining.yml b/Packs/XSOAR_Engineer_Training/Integrations/XSOAREngineerTraining/XSOAREngineerTraining.yml index 5c906c3a85e..b4b330688dd 100644 --- a/Packs/XSOAR_Engineer_Training/Integrations/XSOAREngineerTraining/XSOAREngineerTraining.yml +++ b/Packs/XSOAR_Engineer_Training/Integrations/XSOAREngineerTraining/XSOAREngineerTraining.yml @@ -102,7 +102,7 @@ script: required: true description: Send an email. (Doesn't actually send an email.) name: xet-send-mail - dockerimage: demisto/python3:3.10.14.97100 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '' diff --git a/Packs/XSOAR_Engineer_Training/ReleaseNotes/1_0_3.md b/Packs/XSOAR_Engineer_Training/ReleaseNotes/1_0_3.md new file mode 100644 index 00000000000..afeea2c5d0a --- /dev/null +++ b/Packs/XSOAR_Engineer_Training/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### XSOAR Engineer Training + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/XSOAR_Engineer_Training/pack_metadata.json b/Packs/XSOAR_Engineer_Training/pack_metadata.json index aee534797f3..595cf08311a 100644 --- a/Packs/XSOAR_Engineer_Training/pack_metadata.json +++ b/Packs/XSOAR_Engineer_Training/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR Engineer Training", "description": "XSOAR Engineer Training (XET) Pack, this pack contains content utilized to train you on how to be an XSOAR Engineer.", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Mike Beauchamp", "url": "", "email": "", diff --git a/Packs/ZeroTrustAnalyticsPlatform/Integrations/ZeroTrustAnalyticsPlatform/ZeroTrustAnalyticsPlatform.yml b/Packs/ZeroTrustAnalyticsPlatform/Integrations/ZeroTrustAnalyticsPlatform/ZeroTrustAnalyticsPlatform.yml index 121f836748c..88a2cb170b4 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/Integrations/ZeroTrustAnalyticsPlatform/ZeroTrustAnalyticsPlatform.yml +++ b/Packs/ZeroTrustAnalyticsPlatform/Integrations/ZeroTrustAnalyticsPlatform/ZeroTrustAnalyticsPlatform.yml @@ -119,7 +119,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.90585 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 defaultmapperin: ZeroTrustAnalyticsPlatform - Incoming Mapper defaultmapperout: ZeroTrustAnalyticsPlatform - Outgoing Mapper diff --git a/Packs/ZeroTrustAnalyticsPlatform/ReleaseNotes/1_1_11.md b/Packs/ZeroTrustAnalyticsPlatform/ReleaseNotes/1_1_11.md new file mode 100644 index 00000000000..be06e5f76d9 --- /dev/null +++ b/Packs/ZeroTrustAnalyticsPlatform/ReleaseNotes/1_1_11.md @@ -0,0 +1,21 @@ + +#### Integrations + +##### ZeroTrustAnalyticsPlatform + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + +#### Scripts + +##### ZTAPViewTimeline + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ZTAPParseLinks + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ZTAPExtractFields + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. +##### ZTAPParseFields + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPExtractFields/ZTAPExtractFields.yml b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPExtractFields/ZTAPExtractFields.yml index 893865804d0..2adf511abbb 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPExtractFields/ZTAPExtractFields.yml +++ b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPExtractFields/ZTAPExtractFields.yml @@ -16,7 +16,7 @@ tags: - transformer type: python runas: DBotWeakRole -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.0.0 diff --git a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseFields/ZTAPParseFields.yml b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseFields/ZTAPParseFields.yml index 7df8dc1c595..819f5193b9f 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseFields/ZTAPParseFields.yml +++ b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseFields/ZTAPParseFields.yml @@ -22,7 +22,7 @@ tags: - dynamic-section type: python runas: DBotWeakRole -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.0.0 diff --git a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseLinks/ZTAPParseLinks.yml b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseLinks/ZTAPParseLinks.yml index dbfe7363167..622de773151 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseLinks/ZTAPParseLinks.yml +++ b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPParseLinks/ZTAPParseLinks.yml @@ -12,7 +12,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPViewTimeline/ZTAPViewTimeline.yml b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPViewTimeline/ZTAPViewTimeline.yml index 4c02d079f23..fcf99ec3862 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPViewTimeline/ZTAPViewTimeline.yml +++ b/Packs/ZeroTrustAnalyticsPlatform/Scripts/ZTAPViewTimeline/ZTAPViewTimeline.yml @@ -10,7 +10,7 @@ tags: - ztap type: python runas: DBotWeakRole -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.0.0 diff --git a/Packs/ZeroTrustAnalyticsPlatform/pack_metadata.json b/Packs/ZeroTrustAnalyticsPlatform/pack_metadata.json index 234f82e17b2..9f659e5d938 100644 --- a/Packs/ZeroTrustAnalyticsPlatform/pack_metadata.json +++ b/Packs/ZeroTrustAnalyticsPlatform/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Zero Trust Analytics Platform", "description": "Provides view of raised alerts within ZTAP.", "support": "partner", - "currentVersion": "1.1.10", + "currentVersion": "1.1.11", "author": "Critical Start", "url": "https://support.criticalstart.com/", "email": "support@criticalstart.com", diff --git a/Packs/Zerohack_XDR/Integrations/ZerohackXDR/ZerohackXDR.yml b/Packs/Zerohack_XDR/Integrations/ZerohackXDR/ZerohackXDR.yml index a99fdf5399b..1359252201f 100644 --- a/Packs/Zerohack_XDR/Integrations/ZerohackXDR/ZerohackXDR.yml +++ b/Packs/Zerohack_XDR/Integrations/ZerohackXDR/ZerohackXDR.yml @@ -56,7 +56,7 @@ script: required: true description: The severity level helps in extracting latest incident of a specific severity. description: Fetch a single incident of your choice of severity level to study the incidents structure before you start continously fecthing incidents. - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Zerohack_XDR/ReleaseNotes/1_0_12.md b/Packs/Zerohack_XDR/ReleaseNotes/1_0_12.md new file mode 100644 index 00000000000..f7aed180f39 --- /dev/null +++ b/Packs/Zerohack_XDR/ReleaseNotes/1_0_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Zerohack XDR + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/Zerohack_XDR/pack_metadata.json b/Packs/Zerohack_XDR/pack_metadata.json index b553f17d079..76d5556c03a 100644 --- a/Packs/Zerohack_XDR/pack_metadata.json +++ b/Packs/Zerohack_XDR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Zerohack XDR", "description": "ZeroHack XDR is a Comprehensive Network and Host Threat Detection and Remediation software suite designed on the SaaS model for Clouds and On-Premises Environments. It provides advanced threat detection functionalities using Deep Packet Inspection, Passive Fingerprinting and AI Engine to monitor and learn the Network and individual behavior for early prediction of attacks.", "support": "partner", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Whizhack Technologies", "url": "https://xdr.zerohack.com", "email": "support@whizhack.com", diff --git a/Packs/illuminate/Integrations/Analyst1/Analyst1.yml b/Packs/illuminate/Integrations/Analyst1/Analyst1.yml index 7b094d3238f..24510d3d687 100644 --- a/Packs/illuminate/Integrations/Analyst1/Analyst1.yml +++ b/Packs/illuminate/Integrations/Analyst1/Analyst1.yml @@ -746,7 +746,7 @@ script: - contextPath: Analyst1.EvidenceStatus.processingComplete description: True or false to indicate if processing of the Evidence upload is done. Determined by evaluating the id or message are present and populated. If an id is returned but blank, this is false, indicating the upload is still in progress. description: Check on the status of the analyst1-evidence-submit action by using its output UUID. - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 runonce: false fromversion: 5.0.0 diff --git a/Packs/illuminate/ReleaseNotes/1_1_10.md b/Packs/illuminate/ReleaseNotes/1_1_10.md new file mode 100644 index 00000000000..36e86ad5d39 --- /dev/null +++ b/Packs/illuminate/ReleaseNotes/1_1_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Analyst1 + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/illuminate/pack_metadata.json b/Packs/illuminate/pack_metadata.json index 0a71cd0e0a5..ae6c7aa2eb3 100644 --- a/Packs/illuminate/pack_metadata.json +++ b/Packs/illuminate/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Analyst1", "description": "This integration utilizes Analyst1's system to support multiple operations to assist the cyber analyst. These include intelligence collection from any source, deployment of configured indicator or signature sets for improved boundary/host defense, and enriching XSOAR indicators with data provided by the Analyst1 REST API, such as actor and malware information, activity and reported dates, evidence and hit counts, and more. For assistance with this app and any use cases please contact support@analyst1.com.", "support": "partner", - "currentVersion": "1.1.9", + "currentVersion": "1.1.10", "author": "Analyst1", "url": "", "email": "support@analyst1.com", diff --git a/Packs/remedy_SR/Integrations/remedy_SR/remedy_SR.yml b/Packs/remedy_SR/Integrations/remedy_SR/remedy_SR.yml index 64d2a7c6aca..47b17b7c4a8 100644 --- a/Packs/remedy_SR/Integrations/remedy_SR/remedy_SR.yml +++ b/Packs/remedy_SR/Integrations/remedy_SR/remedy_SR.yml @@ -180,7 +180,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 tests: - No Test beta: true diff --git a/Packs/remedy_SR/ReleaseNotes/1_0_15.md b/Packs/remedy_SR/ReleaseNotes/1_0_15.md new file mode 100644 index 00000000000..f458f4f44c9 --- /dev/null +++ b/Packs/remedy_SR/ReleaseNotes/1_0_15.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### remedy_sr_beta (Beta) + +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. diff --git a/Packs/remedy_SR/pack_metadata.json b/Packs/remedy_SR/pack_metadata.json index 34ebe28fb3e..9a7d353ef86 100644 --- a/Packs/remedy_SR/pack_metadata.json +++ b/Packs/remedy_SR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Remedy SR (Beta)", "description": "The BMC Service Request Management application enables an IT department and other business departments to easily define available services, publish those services in a service catalog, and automate fulfillment of those services for the user community, enabling users to help themselves.\nThis integration uses SOAP API and supports SRM 9.0 version.", "support": "community", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "",