Metadata-Version: 1.1
Name: browser-vulnerabilities
Version: 0.1.0
Summary: Library for detecting vulnerable browsers
Home-page: https://github.com/ojarva/browser-vulnerabilities
Author: Olli Jarva
Author-email: olli@jarva.fi
License: MIT
Download-URL: https://github.com/ojarva/browser-vulnerabilities
Description: Browser vulnerabilities database
        ================================
        
        This small library detects vulnerable operating systems and browsers
        based on browser user-agent string. No active checks are included.
        
        ::
        
          from browser_vulnerabilities import BrowserVulnerability
        
          ua1 = 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0'
          ua2 = 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:27.0) Gecko/20100101 Firefox/27.0'
          bv = BrowserVulnerability(ua1)
          print bv.vulnerabilities() 
          # {'priority': 'recommended', 'readable_version': 'Firefox older than 27.0',
          # 'name': 'Firefox', 'version__smaller': '27.0'}
          bv = BrowserVulnerability(ua2)
          print bv.vulnerabilities()
          # False
        
        Minimal database is available in ``browser_vulnerabilities/data.py`` file. The database is updated manually.
        Order of criteria is important. The most important and most strict criteria should be first. Matching is aborted
        on the first hit.
        
        Mandatory keywords:
        
        - ``platform`` / ``flavor`` / ``name``: first two are for OS, and ``name`` for browser (feature of httpagentparser)
        - ``priority``: 
        
          * "mandatory" - user action is required, and actions should be either denied or delayed with message.
          * "recommended" - updating is highly recommended but not mandatory.
          * "optional" - the warning should be shown to user only when user requests more information.
        
        Optional keywords:
        
        - ``version__smaller``: any version larger than this will not match the rule.
        - ``version__larger``: any version smaller than this will not match the rule.
        - ``version__extra``: compiled ``re`` for additional checks.
        - ``vuln``: link to related website describing the vulnerabilities / why specific update is important.
        - ``readable_name``: user-readable product name
        - ``version``: user-readable version criteria for warnings
        
        
        License
        -------
        
        Licensed under MIT license:
        
        Copyright (c) 2014 Olli jarva olli@jarva.fi
        
        Permission is hereby granted, free of charge, to any person obtaining a copy
        of this software and associated documentation files (the "Software"), to deal
        in the Software without restriction, including without limitation the rights
        to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
        copies of the Software, and to permit persons to whom the Software is
        furnished to do so, subject to the following conditions:
        
        The above copyright notice and this permission notice shall be included in
        all copies or substantial portions of the Software.
        
        THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
        IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
        FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
        AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
        LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
        OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
        THE SOFTWARE.
        
Keywords: browser user-agent vulnerability
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Topic :: Software Development :: Libraries
Classifier: License :: OSI Approved :: MIT License
