I hereby claim:
- I am mirkodziadzka on github.
- I am mirkodziadzka (https://keybase.io/mirkodziadzka) on keybase.
- I have a public key whose fingerprint is 44A9 BBEC 730C FEC9 FE91 61E3 EE82 FC04 67ED E445
To claim this, I am signing this object:
342091405 function calls (323841903 primitive calls) in 212.548 seconds | |
Ordered by: cumulative time | |
List reduced from 770 to 32 due to restriction <32> | |
ncalls tottime percall cumtime percall filename:lineno(function) | |
1 0.000 0.000 212.548 212.548 <string>:1(<module>) | |
1 0.000 0.000 212.548 212.548 performance-test-xhtml2pdf.py:21(test_performance) 1 0.000 0.000 212.548 212.548 lib/python2.7/site-packages/xhtml2pdf/document.py:73(pisaDocument) | |
1 0.030 0.030 210.107 210.107 lib/python2.7/site-packages/reportlab/platypus/doctemplate.py:863(build) | |
221 0.002 0.000 210.052 0.950 lib/python2.7/site-packages/reportlab/platypus/doctemplate.py:748(handle_flowable) |
171,172c171,172 | |
< ALTER TABLE WAFRULEDIRECTIVE ALTER COLUMN ID RESTART WITH 18 | |
< ALTER TABLE WAFTYPE ALTER COLUMN ID RESTART WITH 6 | |
--- | |
> ALTER TABLE WAFRULEDIRECTIVE ALTER COLUMN ID RESTART WITH 20 | |
> ALTER TABLE WAFTYPE ALTER COLUMN ID RESTART WITH 7 | |
21538a21539,21540 | |
> INSERT INTO WAFRULEDIRECTIVE VALUES(18,'deny',6) | |
> INSERT INTO WAFRULEDIRECTIVE VALUES(19,'log',6) | |
21543a21546 |
import time | |
def readFile(filename): | |
res = {} | |
for line in open(filename).read().split("\n"): | |
if line: | |
res[line] = True | |
return res | |
if __name__ == '__main__': |
I hereby claim:
To claim this, I am signing this object:
found vulnerability GENERIC_CROSS_SITE_SCRIPTING on header User-Agent='"<script>alert(1);</script> |
# show memory leak | |
# | |
# run this programm and check memory consumption in a second window | |
# | |
import gc | |
from reportlab.lib import xmllib | |
assert xmllib.sgmlop # check that we are using FastXMLParser | |
while True: |
import select | |
import socket | |
import tlslite | |
from tlslite.tlsconnection import TLSConnection | |
s = open("Projects/daemon/adminServerSSLCert.pem").read() | |
x509 = tlslite.X509() | |
x509.parse(s) |
import asyncore | |
import socket | |
from tlslite.integration.tlsasyncdispatchermixin import TLSAsyncDispatcherMixIn | |
import tlslite | |
s = open("Projects/daemon/adminServerSSLCert.pem").read() | |
x509 = tlslite.api.X509() | |
x509.parse(s) | |
certChain = tlslite.api.X509CertChain([x509]) |