Eml-parser

Latest version: v2.0.0

Safety actively analyzes 682404 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 4

1.14.5

Fixed
- Prevent routing.parserouting() from throwing an exception on unparsable receive lines (thanks kinoute 54).

Changes
- Do not unnecessarily call *eml_parser.decode.robust_string2date* on an empty string.

1.14.4

Fixed
- Fix routing.parserouting() to handle domains containing the word 'from' by themselves (thanks jgru 51).

1.14.3

Changed
Adapted the *examples/simple_test.py* to use the eml_parser class instead of the deprecated method.

Fixed
- When parsing URLs from the body:
- do not try to replace "hxxp" by "http" as we do not parse "hxxp" anyway (legacy)
- skip URLs with no "."
- update the regex for searching for URLs based on https://gist.github.com/gruber/8891611 in order to prevent infinite runs in certain cases (thanks kevin-dunas)

1.14.2

Fixed
Implemented a workaround for an upstream bug (https://bugs.python.org/issue30681) which breaks EML parsing if the source EML contains an unparsable date-time field (thanks nth-attempt).

1.14.1

Fixed
Fixed a bug which prevented correct attachment parsing in certain situations (thanks ninoseki).

1.14.0

Changed
Use simple less time consuming regular expression for searching for IPv4 addresses, in turn use *ipaddress* for both IPv4 and IPv6 address validation which is fast and gives in turn leads to more correct matches.

Page 3 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.