Python-yara

Latest version: v1.0.2

Safety actively analyzes 689579 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 7

4.1.1

BUGFIX: Accept the "+" character as valid in DLL names (1501).
BUGFIX: Buffer overrun in "macho" module.
BUGFIX: Undefined behavior in Windows implementation of yr_filemap_xxx functions (1302).
BUGFIX: Crash due to consecutive jumps in hex strings (1492).

4.1.0

4.1.0rc2

* Don't raise warnings for non-ASCII strings.

4.1.0rc1

* New operators `icontains`, `endswith`, `iendswith`, `startswith`, `istartswith`.
* Raise warnings for non-ascii strings.
* Accept `\t` escape sequence in text strings.
* Add `--no-follow-links` command-line option to `yara`.
* Prevent `yara` from following links to "." (1d2d).
* Implemented [non-blocking scanning API]([https://github.com/VirusTotal/yara/commit/cba6932759ec16a61288b1314b3aee1103ad03ec](https://github.com/VirusTotal/yara/commit/cba6932759ec16a61288b1314b3aee1103ad03ec)) (simonhf).
* When a string causes too many matches, YARA raises a warning instead of failing.

4.0.5

4.0.4

Page 3 of 7

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.