From 8aba13c197ae1ff58c186b2680dd49e9b6996563 Mon Sep 17 00:00:00 2001 From: Nicolas Date: Mon, 22 Jan 2018 17:14:52 -0500 Subject: [PATCH] master: Change securityfocus url to https --- openwebvulndb/common/securityfocus/fetcher.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/openwebvulndb/common/securityfocus/fetcher.py b/openwebvulndb/common/securityfocus/fetcher.py index d3243a8..5a62338 100644 --- a/openwebvulndb/common/securityfocus/fetcher.py +++ b/openwebvulndb/common/securityfocus/fetcher.py @@ -53,7 +53,7 @@ async def get_vulnerability_list(self, vuln_pages_to_fetch=1, file=None): vuln_index = 0 while vuln_pages_to_fetch is None or vuln_index < vuln_pages_to_fetch * vulnerabilities_per_page: post_data = {'op': 'display_list', 'o': vuln_index, 'c': 12, 'vendor': 'WordPress'} - async with self.aiohttp_session.post("http://www.securityfocus.com/bid", data=post_data) as response: + async with self.aiohttp_session.post("https://www.securityfocus.com/bid", data=post_data) as response: assert response.status == 200 vuln_index += vulnerabilities_per_page html_page = await response.text() @@ -78,7 +78,7 @@ async def get_vulnerability_entry(self, bugtraq_id=None, url=None, dest_folder=N solution_parser: A SolutionTabParser object containing the info tab html page of the vulnerability. """ if url is None: - url = "http://www.securityfocus.com/bid/" + bugtraq_id + url = "https://www.securityfocus.com/bid/" + bugtraq_id if bugtraq_id is None: bugtraq_id = re.search("\d+", url).group() pages_to_fetch = ["info", "references", "discuss", "solution", "exploit"]