mysql-binuuid-rails is vulnerable to SQL injection: Model.where(uuid: "ff' OR ''='") turns into:
SELECT `model`.* FROM `model` WHERE `model`.`uuid` = x'ff' OR ''='' LIMIT 11
| BEGIN { | |
| st_waitnewconn = 0 | |
| st_headers = 1 | |
| st_body = 2 | |
| size_threshold = 4000 | |
| } | |
| function count_headers(headers_string, dir) { | |
| split(headers_string, headers, "\n") |
| #!/usr/bin/env python3 | |
| import sys | |
| from collections import defaultdict | |
| import hashlib | |
| def calc_hash(line, num): | |
| m = hashlib.sha256() | |
| m.update(line.encode('ascii')) | |
| m.update(b",") |
I hereby claim:
To claim this, I am signing this object:
| import net/[Address] | |
| import proof | |
| test("same ip4 addresses", func () { | |
| ip1 := IP4Address new("1.2.3.4") | |
| ip2 := IP4Address new("1.2.3.4") | |
| assert(ip1 == ip2) | |
| assert(!(ip1 != ip2)) | |
| }) |
| ... | |
| if asbool(static_files): | |
| # Serve static files | |
| static_app = StaticURLParser(config['pylons.paths']['static_files']) | |
| app = Cascade([static_app, app]) | |
| app = CloseConnection(app) | |
| return app | |
| class CloseConnection: |