Sslyze

Latest version: v6.0.0

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 9 of 12

1.1.5

Not secure
* Fixed JSON output when using Python 2.7 (246).
* Fixed CLI output for showing whether a certificate is EV or not (245).
* Fixed `ConcurrentScanner` when using Python 3.6 (251).

1.1.4

Not secure
* Switch pre-compiled Windows executable from 64 bits to 32 bits for better compatibility.
* Fix dependency version in the setup.py file.

1.1.3

Not secure
* Added support for Python 3.6 on Windows. This is also **the last release to support Python 2.7 on Windows**. Python 2 and 3 will still be supported on other platforms (Linux, macOS).
* Added a pre-compiled executable for running SSLyze on Windows without having to install Python.
* Fixed bugs with StartTLS scans.
* Further improved stability of the new implementation of the Heartbleed and OpenSSL CCS checks.
* Added basic certificate fields (Subject, Issuer, etc.) to the XML output.

1.1.2

Not secure
* Full rewrite of the Heartbleed and CCS checks to fix timeouts and other errors, and to improve maintainability.
* Improvements to the XML output when running the `--certinfo` command.

1.1.1

Not secure
* Bug fixes for EC certificates.
* Bug fixes for the Heartbleed check.

1.1.0

Not secure
* **Added support for Python 3.3+** on Linux and MacOS. Windows will be supported later.
* Added support for scanning for cipher suites on servers that require client authentication.
* Certificate transparency SCTs via OCSP Stapling will be now displayed when running a `CertificateInfoScanCommand`.
* Removed custom code for parsing X509 certificates, which was the source of numerous bugs and crashes when running a `CertificateInfoScanCommand`:
* Certificates returned by the SSLyze Python API are now parsed using the [cryptography](https://github.com/pyca/cryptography) library, making further processing a lot easier and cleaner.
* Certificates returned in the XML and JSON output when using `--certinfo` are no longer parsed. XML/JSON consumers should instead parse the PEM-formatted certificate available in the output using their language/framework's X509 libraries.
* The `--print_full_certificate` option when using `--certinfo` is no longer available.
* Bug fixes for the Heartbleed check.
* Added unit tests for SSL 2.0, SSL 3.0, Heartbleed and OpenSSL CCS injection checks.

Page 9 of 12

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.