Hyland.DocumentFilters.MacOS-x64 23.2.0

There is a newer version of this package available.
See the version list below for details.
dotnet add package Hyland.DocumentFilters.MacOS-x64 --version 23.2.0                
NuGet\Install-Package Hyland.DocumentFilters.MacOS-x64 -Version 23.2.0                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Hyland.DocumentFilters.MacOS-x64" Version="23.2.0" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Hyland.DocumentFilters.MacOS-x64 --version 23.2.0                
#r "nuget: Hyland.DocumentFilters.MacOS-x64, 23.2.0"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Hyland.DocumentFilters.MacOS-x64 as a Cake Addin
#addin nuget:?package=Hyland.DocumentFilters.MacOS-x64&version=23.2.0

// Install Hyland.DocumentFilters.MacOS-x64 as a Cake Tool
#tool nuget:?package=Hyland.DocumentFilters.MacOS-x64&version=23.2.0                

Document Filters is a toolkit that allows application developers to identify and extract metadata, as well as convert and render almost any file type. It is a core component of many products, but can also be leveraged as a stand-alone service for organizations or application developers.

There are no supported framework assets in this package.

Learn more about Target Frameworks and .NET Standard.

NuGet packages (1)

Showing the top 1 NuGet packages that depend on Hyland.DocumentFilters.MacOS-x64:

Package Downloads
Hyland.DocumentFilters.MacOS

Document Filters is a toolkit that allows application developers to identify and extract metadata, as well as convert and render almost any file type. It is a core component of many products, but can also be leveraged as a stand-alone service for organizations or application developers.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
24.3.0 343 8/21/2024
24.2.1 2,971 5/22/2024
24.2.0 259 5/15/2024
24.1.0 508 2/21/2024
23.3.0 611 9/14/2023
23.2.0 525 5/17/2023
23.1.0 804 2/22/2023
22.4.0 763 11/16/2022

# Enhancements

- Introduced HD and metadata support for Canon RAW Version 2 (CR2) files. (DF-1469)
- Introduced HD and metadata support for Canon RAW Version 3 (CR3) files. (DF-1482)
- Introduced callback parameter to DocumentFilters.OpenExtractor() and Extractor.Open() in .NET API to enable "IGR_Open_Ex" support. (DF-1458)
- Introduced callback parameter to DocumentFilters.OpenExtractor() and Extractor.Open() in Java API to enable "IGR_Open_Ex" support. (DF-1460)
- Introduced callback parameter to DocumentFilters.OpenExtractor() and Extractor.Open() in Python API to enable "IGR_Open_Ex" support. (DF-1459)
- Introduced expanded support of "isys:SubType" metadata for Microsoft Excel documents that can help distinguish between the different types of Microsoft Excel documents. (DF-1201)
- Introduced option "TIFF_SUSPECT_API_RATIO_ERROR" to allow disabling the error that is given when X and Y DPIs are not equal and their ratio is below the threshold, defaulting to ON. (DF-1479)
- Introduced password support for DOC files using "IGR_Open_Ex" callbacks. (DF-1253)
- Introduced password support for DOCX files using "IGR_Open_Ex" callbacks. (DF-1244)
- Introduced password support for PPT files using "IGR_Open_Ex" callbacks. (DF-1254)
- Introduced password support for PPTX files using "IGR_Open_Ex" callbacks. (DF-1245)
- Introduced password support for XLS files using "IGR_Open_Ex" callbacks. (DF-1255)
- Introduced password support for XLSX files using "IGR_Open_Ex" callbacks. (DF-1246)
- Introduced password support for ZIP files using "IGR_Open_Ex" callbacks. (DF-1242)

# Updates

- HD Mode: Resolved a condition for Apple Pages where bulleted lists may render an incorrect bullet symbol when converting to HTML. (DF-636)
- HD Mode: Resolved a condition in RTF files where Unicode characters stored as surrogate pairs did not render correctly.  (DF-1462)
- HD Mode: Resolved a condition when converting EML to HTML where email address lists that don't contain spacing would result in incorrect line breaks. (DF-1454)
- HD Mode: Resolved a condition where Old-Style JPEG compressed TIFF files may not render. (DF-1476)
- HD Mode: Resolved a condition where Photoshop images containing additional channels may not render. (DF-1445)
- HD Mode: Resolved a condition where Word 6 files may not render the entire document. (DF-1452)
- HD Mode: Resolved a condition where certain TIFF documents may not render. (DF-1477)
- HD Mode: Resolved a condition where missing TIFF data may cause the image to not render. (DF-1501)
- HD Mode: Resolved a condition where numbered lists may display as bulleted lists in HTML. (DF-424)
- HD Mode: Resolved a condition where word-breaking when the “word” is longer than the available space would cause incorrect spacing. (DF-1470)
- Resolved a condition for EML files where attachment names may be truncated if they are not stored in quotes. (DF-1471)
- Resolved a condition for MS Excel 2007+ documents where the subtype may not be indicated. (DF-961)
- Resolved a condition for RAR archives where password decryption may fail if the subfiles require different passwords. (DF-1487)
- Resolved a condition where a DOCX document could consume an excess amount of memory. (DF-1474)
- Resolved a condition where calling IGR_Extract_Subfile_Stream after calling IGR_Get_Subfiles_Enumerator would result in a crash with subsequent calls. (DF-1499)
- Resolved a condition where error codes would be incorrectly replaced with the generic error code 4 in the Python bindings. (DF-1498)
- Resolved a condition where images may be misidentified as PICT. (DF-1439)
- Security: ODA: CVE-2023-22669: patched: applied security patch to address this issue. (DF-1514)
- Security: ODA: CVE-2023-22670: patched: applied security patch to address this issue. (DF-1510)
- Security: ODA: CVE-2023-26495: patched: applied security patch to address this issue. (DF-1503)
- Security: freetype: CVE-2023-2004: not-exploitable: issue does not exist in version. (DF-1512)
- Security: libtiff: CVE-2022-4645: not-exploitable: issue exists in cli tool, not in library; does not impact document filters.  (DF-1472)
- Security: libtiff: CVE-2023-1916: not-exploitable: issue exists in cli tool, not in library; does not impact document filters. (DF-1506)
- Security: protobuf: CVE-2022-48468: patched: applied security patch to address this issue. (DF-1511)
- Security: snappy: CVE-2023-28115: not-exploitable: unused code block; does not impact document filters. (DF-1488)