{ "info": { "author": "Olli Jarva", "author_email": "olli@jarva.fi", "bugtrack_url": null, "classifiers": [ "Development Status :: 3 - Alpha", "License :: OSI Approved :: MIT License", "Topic :: Software Development :: Libraries" ], "description": "Browser vulnerabilities database\n================================\n\nThis small library detects vulnerable operating systems and browsers\nbased on browser user-agent string. No active checks are included.\n\n::\n\n from browser_vulnerabilities import BrowserVulnerability\n\n ua1 = 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0'\n ua2 = 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:27.0) Gecko/20100101 Firefox/27.0'\n bv = BrowserVulnerability(ua1)\n print bv.vulnerabilities() \n # {'priority': 'recommended', 'readable_version': 'Firefox older than 27.0',\n # 'name': 'Firefox', 'version__smaller': '27.0'}\n bv = BrowserVulnerability(ua2)\n print bv.vulnerabilities()\n # False\n\nMinimal database is available in ``browser_vulnerabilities/data.py`` file. The database is updated manually.\nOrder of criteria is important. The most important and most strict criteria should be first. Matching is aborted\non the first hit.\n\nMandatory keywords:\n\n- ``platform`` / ``flavor`` / ``name``: first two are for OS, and ``name`` for browser (feature of httpagentparser)\n- ``priority``: \n\n * \"mandatory\" - user action is required, and actions should be either denied or delayed with message.\n * \"recommended\" - updating is highly recommended but not mandatory.\n * \"optional\" - the warning should be shown to user only when user requests more information.\n\nOptional keywords:\n\n- ``version__smaller``: any version larger than this will not match the rule.\n- ``version__larger``: any version smaller than this will not match the rule.\n- ``version__extra``: compiled ``re`` for additional checks.\n- ``vuln``: link to related website describing the vulnerabilities / why specific update is important.\n- ``readable_name``: user-readable product name\n- ``version``: user-readable version criteria for warnings\n\n\nLicense\n-------\n\nLicensed under MIT license:\n\nCopyright (c) 2014 Olli jarva olli@jarva.fi\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\nTHE SOFTWARE.", "description_content_type": null, "docs_url": null, "download_url": "https://github.com/ojarva/browser-vulnerabilities", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/ojarva/browser-vulnerabilities", "keywords": "browser user-agent vulnerability", "license": "MIT", "maintainer": null, "maintainer_email": null, "name": "browser_vulnerabilities", "package_url": "https://pypi.org/project/browser_vulnerabilities/", "platform": "UNKNOWN", "project_url": "https://pypi.org/project/browser_vulnerabilities/", "project_urls": { "Download": "https://github.com/ojarva/browser-vulnerabilities", "Homepage": "https://github.com/ojarva/browser-vulnerabilities" }, "release_url": "https://pypi.org/project/browser_vulnerabilities/0.1.0/", "requires_dist": null, "requires_python": null, "summary": "Library for detecting vulnerable browsers", "version": "0.1.0" }, "last_serial": 1026471, "releases": { "0.0.1": [ { "comment_text": "", "digests": { "md5": "f3d70de640b13fef1ce9249e25783df0", "sha256": "ab035f725975f6bed463cf614666eb67403a1f08d4b1af74d9c5413f7a69c6cc" }, "downloads": -1, "filename": "browser_vulnerabilities-0.0.1.tar.gz", "has_sig": false, "md5_digest": "f3d70de640b13fef1ce9249e25783df0", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 3022, "upload_time": "2014-03-10T20:22:38", "url": "https://files.pythonhosted.org/packages/d8/bc/89b88c0e0922ac5ce592b978abc23855125a8a1150cabd0431cc36fd086b/browser_vulnerabilities-0.0.1.tar.gz" } ], "0.0.2": [ { "comment_text": "", "digests": { "md5": "d40a60178882ff1612103dc86b0b477f", "sha256": "38df71be510f0d8ff0107a8f14ee95dd45c593bd46c82cdcd7f37b2225e8d07e" }, "downloads": -1, "filename": "browser_vulnerabilities-0.0.2.tar.gz", "has_sig": false, "md5_digest": "d40a60178882ff1612103dc86b0b477f", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 3138, "upload_time": "2014-03-10T21:05:59", "url": "https://files.pythonhosted.org/packages/fb/1b/d55939445e11e8d5b7b22ec6cfb5d63de484c1a68537c9d42ed6cb4c3af6/browser_vulnerabilities-0.0.2.tar.gz" } ], "0.0.3": [ { "comment_text": "", "digests": { "md5": "dccbb5665adde776d9581877dfd54f6e", "sha256": "6101464b030d723224ca5e86470af5ae18f08098995b29b5b463bcc5ad77ce1a" }, "downloads": -1, "filename": "browser_vulnerabilities-0.0.3.tar.gz", "has_sig": false, "md5_digest": "dccbb5665adde776d9581877dfd54f6e", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 3489, "upload_time": "2014-03-11T09:35:47", "url": "https://files.pythonhosted.org/packages/30/01/57e1c69ba57450eb4c567a6587373db642ec601137b28480c2b4ba4a4281/browser_vulnerabilities-0.0.3.tar.gz" } ], "0.0.4": [ { "comment_text": "", "digests": { "md5": "2b90334315ce7612fb63eebeb60cee24", "sha256": "9156e3e82cc2e7b438d0cee1ca7613d5699a6a0a49ff87879d986e04f6f7af32" }, "downloads": -1, "filename": "browser_vulnerabilities-0.0.4.tar.gz", "has_sig": false, "md5_digest": "2b90334315ce7612fb63eebeb60cee24", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 3623, "upload_time": "2014-03-11T09:44:14", "url": "https://files.pythonhosted.org/packages/8d/21/60e4053a24982fc08c32cd63fb1c97e17c9dbc9a0ef8b39ce13ae4c57796/browser_vulnerabilities-0.0.4.tar.gz" } ], "0.1.0": [ { "comment_text": "", "digests": { "md5": "1d84c1745dfa60492f1576f782dc82ef", "sha256": "0d426398162228de3a975568c81bfc5065c6649e38e34e0b3729cb5a7a1eb1b7" }, "downloads": -1, "filename": "browser_vulnerabilities-0.1.0.tar.gz", "has_sig": false, "md5_digest": "1d84c1745dfa60492f1576f782dc82ef", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 4312, "upload_time": "2014-03-11T23:17:19", "url": "https://files.pythonhosted.org/packages/b1/d5/41b2c3abb9bf37c870b481d2509596048947e6e9b9068c23ecba67242a6c/browser_vulnerabilities-0.1.0.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "1d84c1745dfa60492f1576f782dc82ef", "sha256": "0d426398162228de3a975568c81bfc5065c6649e38e34e0b3729cb5a7a1eb1b7" }, "downloads": -1, "filename": "browser_vulnerabilities-0.1.0.tar.gz", "has_sig": false, "md5_digest": "1d84c1745dfa60492f1576f782dc82ef", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 4312, "upload_time": "2014-03-11T23:17:19", "url": "https://files.pythonhosted.org/packages/b1/d5/41b2c3abb9bf37c870b481d2509596048947e6e9b9068c23ecba67242a6c/browser_vulnerabilities-0.1.0.tar.gz" } ] }