Author: pabs
Date: 2016-03-02 15:30:29 +0000 (Wed, 02 Mar 2016)
New Revision: 40125

Modified:
   bin/tracker_service.py
Log:
https for more of the CVE links

Modified: bin/tracker_service.py
===================================================================
--- bin/tracker_service.py      2016-03-02 15:23:22 UTC (rev 40124)
+++ bin/tracker_service.py      2016-03-02 15:30:29 UTC (rev 40125)
@@ -1476,17 +1476,17 @@
     def url_fulldesc_bug(self, url, name):
         return url.absolute("https://marc.info/";, l="full-disclosure", s=name)
     def url_osvdb_bug(self, url, name):
-        return url.absoluteDict("http://osvdb.org/search/search";, 
{"search[refid]": name})
+        return url.absoluteDict("https://osvdb.org/search/search";, 
{"search[refid]": name})
     def url_edb_bug(self, url, name):
         name = name[len('CVE-'):] if name.startswith('CVE-') else name
-        return url.absolute("http://www.exploit-db.com/search/";, 
action="search", cve=name)
+        return url.absolute("https://www.exploit-db.com/search/";, 
action="search", cve=name)
     def url_metasploit_bug(self, url, name):
         return url.absolute("https://www.rapid7.com/db/search";, q=name)
     def url_rhbug(self, url, name):
         return url.absolute("https://bugzilla.redhat.com/show_bug.cgi";,
                             id=name)
     def url_ubuntu_bug(self, url, name):
-        return 
url.absolute("http://people.canonical.com/~ubuntu-security/cve/%s"; % name)
+        return 
url.absolute("https://people.canonical.com/~ubuntu-security/cve/%s"; % name)
     def url_gentoo_bug(self, url, name):
         return url.absolute("https://bugs.gentoo.org/show_bug.cgi";, id=name)
     def url_suse_bug(self, url, name):


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to