Parsedmarc

Latest version: v8.16.0

Safety actively analyzes 682471 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 28

8.15.4

------

- Fix crash if aggregate report timespan is > 24 hours

8.15.3

------

- Ignore aggregate reports with a timespan of > 24 hours (Fixes 282)

8.15.2

------

- Require `mailsuite>=1.9.18`
- Pins `mail-parser` version at `3.15.0` due to a parsing regression in mail-parser `4.0.0`
- Parse aggregate reports with empty `<auth_results>`
- Do not overwrite the log on each run (PR 569 fixes issue 565)

8.15.1

------

- Proper IMAP namespace fix (Closes issue 557 and issue 563)
- Require `mailsuite>=1.9.17`
- Revert PR 552
- Add pre-flight check for nameservers (PR 562 closes issue 543)
- Reformat code with `ruff`

8.15.0

------

- Fix processing of SMTP-TLS reports ([549](https://github.com/domainaware/parsedmarc/issues/549)), which broke in commit [410663d ](https://github.com/domainaware/parsedmarc/commit/410663dbcaba019ca3d3744946348b56a635480b)(PR [#530](https://github.com/domainaware/parsedmarc/pull/530))
- This PR enforced a stricter check for base64-encoded strings, which SMTP TLS reports from Google did not pass
- Removing the check introduced its own issue, because some file paths were treated as base64-encoded strings
- Create a separate `extract_report_from_file_path()` function for processioning reports based on a file path
- Remove report extraction based on a file path from `extract_report()`

8.14.2

------

- Update `base_reverse_dns_map.csv` to fix over-replacement on [`f3a5f10`](https://github.com/domainaware/parsedmarc/commit/f3a5f10d67b02c5db31ae1f7ced68028f46ca2a3) (PR #553)

Page 1 of 28

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.