mysql-binuuid-rails
is vulnerable to SQL injection: Model.where(uuid: "ff' OR ''='")
turns into:
SELECT `model`.* FROM `model` WHERE `model`.`uuid` = x'ff' OR ''='' LIMIT 11
BEGIN { | |
st_waitnewconn = 0 | |
st_headers = 1 | |
st_body = 2 | |
size_threshold = 4000 | |
} | |
function count_headers(headers_string, dir) { | |
split(headers_string, headers, "\n") |
#!/usr/bin/env python3 | |
import sys | |
from collections import defaultdict | |
import hashlib | |
def calc_hash(line, num): | |
m = hashlib.sha256() | |
m.update(line.encode('ascii')) | |
m.update(b",") |
import net/[Address] | |
import proof | |
test("same ip4 addresses", func () { | |
ip1 := IP4Address new("1.2.3.4") | |
ip2 := IP4Address new("1.2.3.4") | |
assert(ip1 == ip2) | |
assert(!(ip1 != ip2)) | |
}) |
... | |
if asbool(static_files): | |
# Serve static files | |
static_app = StaticURLParser(config['pylons.paths']['static_files']) | |
app = Cascade([static_app, app]) | |
app = CloseConnection(app) | |
return app | |
class CloseConnection: |
I hereby claim:
To claim this, I am signing this object: