summaryrefslogtreecommitdiff
path: root/README.txt
diff options
context:
space:
mode:
authorJon Dufresne <jon.dufresne@gmail.com>2018-04-04 21:39:54 -0700
committerChristian Heimes <christian@python.org>2019-04-14 11:43:38 +0200
commita320fbc6cd9c27fbeed98e358814c112d22815ed (patch)
tree3ee188bdfc49242e412ca7193c7f8d16bcd9b0d3 /README.txt
parentf2c7c35b25f80c08923be49ac1f81e9cf95bd2ae (diff)
downloaddefusedxml-git-a320fbc6cd9c27fbeed98e358814c112d22815ed.tar.gz
Use https:// URLs where available
Diffstat (limited to 'README.txt')
-rw-r--r--README.txt18
1 files changed, 9 insertions, 9 deletions
diff --git a/README.txt b/README.txt
index ad759cc..ae2adc5 100644
--- a/README.txt
+++ b/README.txt
@@ -503,7 +503,7 @@ lzma is even better::
148K zeros.xy
None of Python's standard XML libraries decompress streams except for
-``xmlrpclib``. The module is vulnerable <http://bugs.python.org/issue16043>
+``xmlrpclib``. The module is vulnerable <https://bugs.python.org/issue16043>
to decompression bombs.
lxml can load and process compressed data through libxml2 transparently.
@@ -716,7 +716,7 @@ Copyright (c) 2013-2017 by Christian Heimes <christian@python.org>
Licensed to PSF under a Contributor Agreement.
-See http://www.python.org/psf/license for licensing details.
+See https://www.python.org/psf/license for licensing details.
Acknowledgements
@@ -743,7 +743,7 @@ Carl Meyer (Django)
Daniel Veillard (libxml2)
Many thanks to Daniel for his insight and assistance with libxml2.
-semantics GmbH (http://www.semantics.de/)
+semantics GmbH (https://www.semantics.de/)
Many thanks to my employer semantics for letting me work on the issue
during working hours as part of semantics's open source initiative.
@@ -764,13 +764,13 @@ References
.. _modified expat: https://bitbucket.org/tiran/expat
.. _expat parser: http://expat.sourceforge.net/
.. _Attacking XML Security: https://www.isecpartners.com/media/12976/iSEC-HILL-Attacking-XML-Security-bh07.pdf
-.. _Billion Laughs: http://en.wikipedia.org/wiki/Billion_laughs
-.. _XML DoS and Defenses (MSDN): http://msdn.microsoft.com/en-us/magazine/ee335713.aspx
-.. _ZIP bomb: http://en.wikipedia.org/wiki/Zip_bomb
-.. _DTD: http://en.wikipedia.org/wiki/Document_Type_Definition
+.. _Billion Laughs: https://en.wikipedia.org/wiki/Billion_laughs
+.. _XML DoS and Defenses (MSDN): https://msdn.microsoft.com/en-us/magazine/ee335713.aspx
+.. _ZIP bomb: https://en.wikipedia.org/wiki/Zip_bomb
+.. _DTD: https://en.wikipedia.org/wiki/Document_Type_Definition
.. _PI: https://en.wikipedia.org/wiki/Processing_Instruction
.. _Avoid the dangers of XPath injection: http://www.ibm.com/developerworks/xml/library/x-xpathinjection/index.html
.. _Configure SAX parsers for secure processing: http://www.ibm.com/developerworks/xml/library/x-tipcfsx/index.html
.. _Testing for XML Injection: https://www.owasp.org/index.php/Testing_for_XML_Injection_(OWASP-DV-008)
-.. _Xerces SecurityMananger: http://xerces.apache.org/xerces2-j/javadocs/xerces2/org/apache/xerces/util/SecurityManager.html
-.. _XML Inclusion: http://www.w3.org/TR/xinclude/#include_element
+.. _Xerces SecurityMananger: https://xerces.apache.org/xerces2-j/javadocs/xerces2/org/apache/xerces/util/SecurityManager.html
+.. _XML Inclusion: https://www.w3.org/TR/xinclude/#include_element