Browse code

update many urls to https

Hanno Böck authored on08/12/2019 16:19:01
Showing1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 [Serendipity-mycalendar]
2
-url=http://www.s9y.org
2
+url=https://s9y.org
3 3
 safe=0.13
4 4
 vuln=CVE-2007-6390
5 5
 file=serendipity_event_mycalendar.php
... ...
@@ -7,7 +7,7 @@ variable=$propbag->add('version'
7 7
 subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10
-url=http://www.s9y.org
10
+url=https://s9y.org
11 11
 safe=3.69
12 12
 vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3
13 13
 file=serendipity_event_freetag.php
... ...
@@ -15,7 +15,7 @@ variable=$propbag->add('version'
15 15
 subdir=0
16 16
 
17 17
 [SquirrelMail-gpg]
18
-url=http://www.squirrelmail.org/plugin_view.php?id=153
18
+url=https://squirrelmail.org/plugin_view.php?id=153
19 19
 safe=2.1
20 20
 vuln=CVE-2007-3779
21 21
 file=gpg_pref_functions.php
... ...
@@ -23,7 +23,7 @@ variable=$GPG_VERSION
23 23
 subdir=0
24 24
 
25 25
 [Drupal-Views]
26
-url=http://drupal.org/project/views
26
+url=https://www.drupal.org/project/views
27 27
 safe=2.13
28 28
 vuln=CVE-2011-4113
29 29
 file=views.info
... ...
@@ -49,7 +49,7 @@ extra_match=TimThumb
49 49
 subdir=0
50 50
 
51 51
 [Joomla-JCE]
52
-url=http://www.joomlacontenteditor.net/
52
+url=https://www.joomlacontenteditor.net/
53 53
 safe=2.1
54 54
 vuln=CVE-2012-2902
55 55
 file=editor.php
... ...
@@ -58,7 +58,7 @@ extra_match=JCE class
58 58
 subdir=3
59 59
 
60 60
 [WP Super Cache]
61
-url=http://wordpress.org/extend/plugins/wp-super-cache/
61
+url=https://wordpress.org/plugins/wp-super-cache/
62 62
 safe=1.4.9
63 63
 latest=1.4.9
64 64
 vuln=https://wptavern.com/wp-super-cache-1-4-9-patches-multiple-xss-vulnerabilities
... ...
@@ -68,7 +68,7 @@ extra_match=Plugin Name: WP Super Cache
68 68
 subdir=0
69 69
 
70 70
 [W3 Total Cache]
71
-url=http://wordpress.org/extend/plugins/w3-total-cache/
71
+url=https://wordpress.org/plugins/w3-total-cache/
72 72
 safe=0.9.5
73 73
 vuln=https://secupress.me/w3-total-cache-vulnerable-xss-high-risk/
74 74
 file=w3-total-cache.php
... ...
@@ -93,7 +93,7 @@ variable=JETPACK__VERSION
93 93
 subdir=0
94 94
 
95 95
 [Wordpress-MailPoet]
96
-url=http://www.mailpoet.com/
96
+url=https://www.mailpoet.com/
97 97
 safe=2.6.8
98 98
 vuln=CVE-2014-4726
99 99
 file=base.php
... ...
@@ -110,7 +110,7 @@ variable=Version
110 110
 subdir=0
111 111
 
112 112
 [Wordpress-SliderRevolution]
113
-url=http://themepunch.com/revolution/
113
+url=https://revolution.themepunch.com/
114 114
 safe=4.2.0
115 115
 vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
116 116
 file=revslider.php
... ...
@@ -134,7 +134,7 @@ variable=AKISMET_VERSION
134 134
 subdir=0
135 135
 
136 136
 [Wordpress-AllInOneSEO]
137
-url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
137
+url=https://semperplugins.com/all-in-one-seo-pack-changelog/
138 138
 safe=2.3.8
139 139
 vuln=https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
140 140
 file=all_in_one_seo_pack.php
... ...
@@ -166,7 +166,7 @@ variable=<version>
166 166
 subdir=0
167 167
 
168 168
 [Wordpress-SEObyYoast]
169
-url=https://wpvulndb.com/vulnerabilities/7841https://wordpress.org/plugins/fancybox-for-wordpress/
169
+url=https://wordpress.org/plugins/wordpress-seo/
170 170
 safe=2.2
171 171
 vuln=https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
172 172
 file=wp-seo-main.php
... ...
@@ -182,7 +182,7 @@ variable=GAWP_VERSION
182 182
 subdir=0
183 183
 
184 184
 [Wordpress-Captcha]
185
-url=https://de.wordpress.org/plugins/captcha/
185
+url=https://wordpress.org/plugins/captcha/
186 186
 safe=4.4.5
187 187
 vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
188 188
 file=captcha.php